Implementing Workload-specific Security Part I