¨Provides a view of the major security subsystems in the TOE
¨Shows where security subsystems fit into the overall TOE design
¨While not explicit in the CC, CEM guidance seems to equate security subsystems with collections of subroutines that deal with similar ST functions
¨My experience is that the HLD explains how the TOE is organized to provide the security functions