Security best practices

shape