Beyond, or in lieu of, the ability to secure a user with Selective Access via a General List, administrators should be able to secure via an existing Subset. We have calculation modules driven by the Subset, and we duplicate this cherry-picking in the setup of Selective Access on these Lists, which duplicates effort and allows for inconsistent setup.