15.14. Implementing a Secure Environment with MAC