We present an approach using two dimensions to propagate security restrictions: along the lifecycle and along the architectural levels. We believe that this double propagation can be very effective for security. This approach can also facilitate the security analysis of the system.