The instructions are operable to cause one or more machines to perform operations including generating a security tender, the security tender containing security requirements for the application, and determining that a security contract has been received, the contract specifying how the application is to communicate with security services that satisfy the security requirements.