Practice 4: Secure Implementation

List of requirements