Yes. Tzunami Deployer extracts the source security definitions and enables the mapping of these to SharePoint security definitions. Security modeling is a complex topic. If you have any further questions about how Tzunami Deployer supports security extraction and modeling, please contact the Tzunami Support Team at support@tzunami.com.