Planning for protocol data security

It is recommended to adhere to the following best practices when you plan to set up data security: