What Is The First Step Toward Security Rule Compliance