How to design secure remote-controlled operations

How to design secure remote-controlled operations