A security manager receives a request for data that is subject to data
security management. The security manager operates independently of a
host partition and is not directly accessible or detectable by the host
partition. The security manager determines whether to grant or deny
access to the requested data based at least in part on a requesting
user's authentication credentials. If the data request is approved, a
security policy associated with the data is determined. In addition,
instructions are sent to a system hypervisor to create a secure
partition. The hypervisor loads the requested data and a verified version
of an application necessary to access the data into the secure partition
creating a secure environment for accessing the data.