8) Layer 8: authorization and audit Security 9)