Part 6: Securing EPM