3.3.2 IT Security - POSSE Availability