Figure5
From: Crafting organizational security policies for critical infrastructures: an architectural approach

Figure 5. Case Ⅱ: The Central Registry use case: this diagram illustrates the final configuration of the Regional Healthcare System architecture, after the evaluation and the fixing performed using the illustrated methodology. In this case, the external source must pass through the Identity Management Subsystem to access the Repository.