13.0 Preparing Linux Workloads for Protection