To ensure overall secure deployment of PPM, you should carefully plan security for all components, such as database servers and client computers that are required for and interact with PPM. In addition to the documentation included with other applications and hardware components, follow the PPM-specific guidance below.