Rules for applying customized security API

The following are rules for applying customized security API: