A technique for identifying dependencies of an application upon a given
security context includes monitoring security checks generated by the
application. The security checks requiring elevated rights are identified
and the state of execution of the application corresponding to the
identified security checks may be logged. The security checks requiring
elevated rights may be identified by monitoring access checks, monitoring
privilege checks, checking user/group identifiers against a list of known
identifiers associated with elevated rights, or the like.