The Challenges of Fulfilling Operational Demands of Security-Sensitive Applications