The product has no access levels.
The IT security of the product is only guaranteed when used in an environment secured by defense-in-depth strategies.