Uses security groups to ensure that the sources of access are trusted.
Uses SSL channels to encrypt data during transmission.