Security model (2/28)

Security model