Back to Security Pattern Catalog

Protected System

Classification Key : Security Pattern Space


Protecting systems against unauthorized access is the first line of defense. At the entry point, the requests have to evaluated and access permission is granted only if they conform to some policy. How can this goal be achieved?


Structure a system so that all access by clients to resources is mediated by a guard which enforces a security policy. The guard can be any type of firewall that acts as the policy enforcement point. Each resource or the overall system is protected by a guard that evaluates the incoming requests.

Known Uses

Java 2 Access Controller. A Bank Vault.

Related Patterns

Single Access Point, Policy Enforcement Point, Policy


Open Group Catalog


Access Control, Policy


Last modified: May 05, 2012

Conceived and Maintained by: Munawar Hafiz