Corporations, worldwide, are steadily adopting SOA as a technique to establish enterprise architecture within their organizations. SOA exposes specific services that mimic business functions performed by the system. These services are consumed by either other parts of the system or the users directly. The advantages provided by SOA services have led to their widespread adoption. On the flipside, the 'exposed services' within SOA has forced organizations to take adequate measures to safeguard access to these services which directly or indirectly are privy to sensitive data. It has thus become imperative to factor security considerations as early as during the design phase of the SOA.