What are the full security requirements under this policy?