This guide outlines the architecture used by DKP to meet standard security requirements, supplies the reader with a basic understanding of the implementation, maps each concept back to the appropriate security controls, and notes any areas for improvement and product maturity.