Using a security checklist for system setup