After the first run, security is maintained at all times even if nothing is done thereafter.
Field of Introduction
System requirements Specs