Identify security issues around steady state operation and management of software and incorporate security measures that must be taken when a product reaches its end of life.