2.9 Securing the Gateway Services