See the Guideline for Security of Endpoints and Guideline for Security of Applications for additional information.