Visible to the public Security as a System-Level Constraint