Examine the security settings that the underlying network and host infrastructure offer to the application, and examine any restrictions that the target environment might impose. Also consider your deployment topology and the impact of middle-tier application servers, perimeter zones, and internal firewalls on your design.
Review the following questions to identify potential deployment and infrastructure issues:
Does the network provide secure communication?
Does your deployment topology include an internal firewall?
Does your deployment topology include a remote application server?
What restrictions does infrastructure security impose?
Have you considered Web farm issues?
What trust levels does the target ...