10.2. About the Structure of the Security Subsystem