Chapter 2. Securing management interfaces and applications