Security life cycle