IT security of the product

The product has no access levels.

The IT security of the product is only guaranteed when used in an environment secured by defense-in-depth strategies.