Doing so eliminates single points of failure, provides redundant capabilities, increases access granularity and auditing, and implements an effective computer or network attack detection and reaction capability.(2) ???The Army enterprise IA security DiD structure requires a layering of security policies, procedures, and technology, including best practices such as redundant capabilities or use of