admin February 28, 2023 Determining the vulnerable locations is in the created IT-infrastructure Selection of server equipment and software Customization and adaptation of software products Automation of management processes