Applying Security Rules

Any security rules and policies (e.g. RBS, CBS) should be applied on top of cached resources rather than on the resources being cached or the resources that the cached resources depend on.