Back to Security Pattern Catalog


Classification Key : Perimeter Security


Systems often express their requirements as policies. However, the policy has to be enforced to check conformance. The policy enforcement functions have to be invoked in a correct sequence. How can the policy decisions be effectively evaluated?


Isolate the part that makes policy enforcement decision in a discrete component of the system. Ensure that policy enforcement activities are performed in proper sequence.

Known Uses

Client Secure Invocation Policy and Server Secure Invocation Policy in CORBA.

Related Patterns

Role Based Access Control, Policy Enforcement Point


Open Group Catalog


Access Control, Policy


Last modified: May 05, 2012

Conceived and Maintained by: Munawar Hafiz