[Lab 2] Defending a vulnerable application3. Generate a templated policy as our starting pointOverview