diff --git a/aio/content/guide/security.en.md b/aio/content/guide/security.en.md
new file mode 100644
index 000000000000..2dd439d7d27f
--- /dev/null
+++ b/aio/content/guide/security.en.md
@@ -0,0 +1,322 @@
+# Security
+
+This page describes Angular's built-in
+protections against common web-application vulnerabilities and attacks such as cross-site
+scripting attacks. It doesn't cover application-level security, such as authentication (_Who is
+this user?_) and authorization (_What can this user do?_).
+
+For more information about the attacks and mitigations described below, see [OWASP Guide Project](https://www.owasp.org/index.php/Category:OWASP_Guide_Project).
+
+You can run the in Stackblitz and download the code from there.
+
+
+
+
+ Reporting vulnerabilities
+
+
+
+
+To report vulnerabilities in Angular itself, email us at [security@angular.io](mailto:security@angular.io).
+
+For more information about how Google handles security issues, see [Google's security
+philosophy](https://www.google.com/about/appsecurity/).
+
+
+
+
+ Best practices
+
+
+
+
+* **Keep current with the latest Angular library releases.**
+We regularly update the Angular libraries, and these updates may fix security defects discovered in
+previous versions. Check the Angular [change
+log](https://github.com/angular/angular/blob/master/CHANGELOG.md) for security-related updates.
+
+* **Don't modify your copy of Angular.**
+Private, customized versions of Angular tend to fall behind the current version and may not include
+important security fixes and enhancements. Instead, share your Angular improvements with the
+community and make a pull request.
+
+* **Avoid Angular APIs marked in the documentation as “_Security Risk_.”**
+For more information, see the [Trusting safe values](guide/security#bypass-security-apis) section of this page.
+
+
+
+
+ Preventing cross-site scripting (XSS)
+
+
+
+
+[Cross-site scripting (XSS)](https://en.wikipedia.org/wiki/Cross-site_scripting) enables attackers
+to inject malicious code into web pages. Such code can then, for example, steal user data (in
+particular, login data) or perform actions to impersonate the user. This is one of the most
+common attacks on the web.
+
+To block XSS attacks, you must prevent malicious code from entering the DOM (Document Object Model). For example, if
+attackers can trick you into inserting a `