How can separation be used to protect IT infrastructure?

profileaprva_6