Part 2: Setting Up EPM Infrastructure, Business Rules, and Security