A comprehensive system and method for managing security in an electronic
network. The method includes the steps of providing a plurality of
security services, providing a plurality of security mechanisms, and
linking the services and mechanisms with a plurality of security
management functions. The method supports all associated security
protocols in the electronic network while maintaining transparency for
message exchange. Advantageously, the method of the invention readily
provides compatibility with a plurality of environments, network types,
and technologies. The method provides five functional hierarchical layers,
one protocol handling access to the layers, and includes a security
management information base segmented according to the five functional
layers. The five functional layers are, from the base, fundamental
security primitives, security mechanisms, security services, security
management functions, and security policies. Each layer can contain
several independent modules. Exchange of messages between modules in a
layer and between layers is provided. An implementing system facilitates
the method in an electronic network, illustratively including an
electronic processing environment.