explanation of some of the control features within the AIX operating system and how to ensure the customer is taking advantage of as many of these built in security features as possible.