CHAPTER 5 Physical Security
CHAPTER 6 Authentication and Authorization Controls
CHAPTER 7 Data Security Architecture
CHAPTER 8 Security Management Architecture