See below for the performed technical security controls.