Figure5
From: Crafting organizational security policies for critical infrastructures: an architectural approach
![Crafting organizational security policies for critical infrastructures: an architectural approach](https://image.oaes.cc/c3cefa6d-347b-48a5-97e0-b5e417ac49b8/jsss4040-5.jpg)
Figure 5. Case Ⅱ: The Central Registry use case: this diagram illustrates the final configuration of the Regional Healthcare System architecture, after the evaluation and the fixing performed using the illustrated methodology. In this case, the external source must pass through the Identity Management Subsystem to access the Repository.