ive implementation of the present invention. [0055]FIGS. 12A and 12B are a schematic block diagram illustrating a system for implementing a multi-tiered policy-based enforcement of a Security Policy across a large, globally distributed enterprise. [0056]FIGS. 12C and 12D illustrate an exemplary Security Rule Base for use in implementing the system of FIGS. 12A and 12B. [0057]FIG. 12E is a process