A file which contains text describing the current security policies enforced in a network. Such files are usually set up by a system administrator. The file is consulted whenever a component of the system attempts to carry out an action which might compromise the current security policy.