An automated method and apparatus for creating a security policy for one
or more applications is provided. The method includes exercising the
features of the one or more applications to generate behavioral data,
applying a heuristic to aggregate the behavioral data into a subset of
representative actions, and organizing the representative actions
according to a structure defined by a template into a security policy for
the one or more applications. The security policy may be downloaded to
one or more workstations for deployment, and provides a safeguard to
protect a computer system against cyber-terrorism.