Security requirements

shape