Figure4
From: Crafting organizational security policies for critical infrastructures: an architectural approach
![Crafting organizational security policies for critical infrastructures: an architectural approach](https://image.oaes.cc/c3cefa6d-347b-48a5-97e0-b5e417ac49b8/jsss4040-4.jpg)
Figure 4. Initial system architecture: the central registry use case: the diagram illustrates the initial configuration of the Regional Healthcare System architecture, where the external source can access the repository without authentication, introducing a problematic connection from Security Zone 3 to Security Zone 1.