Methods and systems for providing data security scanning in a network. A
network device ascertains, based on a network's security policy, security
technologies that are should or must be applied to the network traffic.
The network device applies the not yet applied security technologies,
based on a determination that the not yet applied security technologies
are available to the network device. Next, the network device tags the
network traffic with a security marker indicating the not yet applied
security technologies as applied to reflect the security technologies
applied to the network traffic.