Clearly the security management service will have to interact with the various peripheral applications for policy definition and logging purposes, and for gathering information and taking action. These interactions are discussed in the according paragraphs from chapter 2. We will now focus on how the various security services as defined in paragraph 2.1.6 can be provided through interaction with the central security management service.