1.2.2 Security aspects