This chapter covered security dependencies. If you were to read only one chapter of this entire book, this is quite possibly the one you should read. Security dependencies is an incredibly overlooked area in information security. Often dependencies are accidentally implemented by administrators who do not understand them. In other cases, they are designed into the product by the developer. In either case, they must be understood and managed, in accordance with your risk management philosophy and security policy.