The security of the infrastructure is designed in progressive layers starting from the physical security of data centres, continuing on to the security of the hardware and software that makes up the platform, and finally, the technical constraints and processes in place to support operational security.