/docs/2_Architecture_Guides/2.2_Security_Blueprint/6_Application/