Figure 18: CIM Catalog Security Overview