Figure J-1 shows an example of a secure configuration at the corporate level and individual store.
Figure J-1 Corporate and Store Configuration