We should populate the top and high level descriptions for Identity and Access Management in the Security Architecture Guide.