Always cache the results, and bypass low-level security calls when the respective subsystem is not enabled.