The First Step Toward Security Rule Compliance Is