The security analysis should repeated on the specifications as they are now once are nearly complete.