Rules to Protect IT Infrastructure