This draft does not add any significant security considerations from the base publications for the protocol. Key security considerations are addressed in supporting document including mutual authentication and key (asymmetric and symmetric) provisioning as well as policy requirements. The security considerations add awareness to mitigate from the possibilities of data leaks. Congratulations to all those who have worked on this series of documents! Best regards, Kathleen