Applying Security Policy Tools