Encryption Policy Connection Acceptance Policy Syntax Checking Policy Authentication protocol Access Control Policy Semantics checking policy Obscurity policy Logging policy Code quality