Appendix B: Securing Architecture Flows