All processor nodes are part of the default subsystem in absence of a user defined Subsystem or Isolation Configuration.
In this configuration, all processor nodes have permission to access all devices, so exercise caution on how peripheral nodes are used.