pick one or two beans.xml module files to analyze
* what can be done differently * what should be done differently in according to Spring Security