Security Adversary may try to attack the interface to the privileged monitor. Careful auditing required. Number of valid request is small. Bad request lead to process termination.