I reviewed -06 and confirmed that the Security Considerations section follows the model as documented at https://wiki.ietf.org/group/ops/yang-security-guidelines. In particular, the security considerations for the augmented data nodes are explicitly called out in the Security Considerations section. I believe this document is ready.