2. Security boundaries

Complete and Continue