Security boundaries in the system layer