With all the talk about security on the Internet and in the applications that are out there, we must not forget about keeping company "jewels" safe. Here are some recommendations that were covered in this chapter:
At a minimum, use the four-layer approach talked about in detail in this chapter:
Physical security Doors, locks, cameras, and so on.
Tracking source changes The build process.
Binary/release bits assurance The tools process.
IT infrastructure Company-wide policy and security.
Consider the .NET platform as a means of security.
Look into software restriction policies that are in Microsoft Windows XP and Windows Server 2003.
Start worrying about security before a breach occurs.