Hierarchy of Information Security Levels. The arrows indicate the direction in which rules allow data to flow.