We start with education and simulation, graduate to real value movement with compliance.
Auth, encryption-at-rest/in-transit, least-privilege, audit trails.