Applying Security Policy Tools Used For Expansionary