First Step Towards Security Rule Compliance