A method and system for generating security rules for implementation by a
rule interpretation engine to define accessibility to one or more aspects
of an Enterprise System is described. The method and system allow a
security officer to graphically indicate an operation to be affected by
the security rule being defined; a specific aspect of the system affected
by the rule; a security regulation to be implemented by the rule; and an
access type to be permitted by the rule.