Mechanisms exist to implement underlying software separation mechanisms to facilitate security function isolation.
Does the organization implement underlying software separation mechanisms to facilitate security function isolation?