Very carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.