Step 2:

EDS Architecture

Components
Flow of data
Data security