A unified threat management system is provided with a uniform relational
rules model. The unified relational rules model provides for the
sub-setting of rules and the ability to derive a result based partially
from previous security measurements. The sharing of a security check from
one security implementation to another using an object-oriented
methodology is facilitated. Security policy is divided into specific
security features that result in a security hierarchy. The security
features may be considered to be listed sequentially, from bottom to top,
and form a relationship with one another. These relationships are used to
build a current security measure upon a previous security measure and may
be used as a pre-cursor when marshalling data content to be validated.