Owl: Approach to security (cont.) Policy enforcement and integrity checking "Strong" cryptography within core OS components "Hardening" to reduce likelihood and/or impact of successful real-world attacks on insecure third-party software one might install on the system A wide range of security tools available for use "out of the box"