For all practical purposes external threats can be handled using commercial off the shelf firewall technology.
Internal threats are much more complicated. They must be handled through design of the registrar-coredb protocol and suitable policy choices.