How Does The Process for Tackling Security Requests Look Like?