Some of the pervasive security mechanisms are enlisted below:
- Trusted functionality
- Security labels
- Event detection
- Security audit trails
- Security recovery