• Security concerns
  • Mitigation
  • Using a hardware token to encrypt the configuration file
  • Software implementation