3.0 Security Considerations