diff --git a/private/property_contexts b/private/property_contexts
index 51b9ff8c6f557e45dcafa470bd04b21dc3123276..2e0b2dd3f33bb1a44789d3da45aac6600ca8a56b 100644
--- a/private/property_contexts
+++ b/private/property_contexts
@@ -65,7 +65,6 @@ ro.device_owner         u:object_r:device_logging_prop:s0
 
 # selinux non-persistent properties
 selinux.restorecon_recursive   u:object_r:restorecon_prop:s0
-selinux.                       u:object_r:security_prop:s0
 
 # default property context
 *                       u:object_r:default_prop:s0
diff --git a/public/domain.te b/public/domain.te
index 696d3029eb92d5bc2f912af53b6726cc26982860..1dac142959c1f1665eca208ce9f8a6c74c34d8be 100644
--- a/public/domain.te
+++ b/public/domain.te
@@ -229,9 +229,6 @@ neverallow { domain -recovery } self:capability2 mac_admin;
 # It is sealed.
 neverallow * kernel:security load_policy;
 
-# Only init and the system_server shall use the property_service.
-neverallow { domain -init -system_server } security_prop:property_service set;
-
 # Only init prior to switching context should be able to set enforcing mode.
 # init starts in kernel domain and switches to init domain via setcon in
 # the init.rc, so the setenforce occurs while still in kernel. After
diff --git a/public/property.te b/public/property.te
index 1ad1dd007e84c4bf24c53b2c0c0495dc5750e882..e4b8d6e434b33c39f4c31a9af72e3d11436cb2d2 100644
--- a/public/property.te
+++ b/public/property.te
@@ -35,7 +35,6 @@ type powerctl_prop, property_type, core_property_type;
 type radio_prop, property_type, core_property_type;
 type restorecon_prop, property_type, core_property_type;
 type safemode_prop, property_type;
-type security_prop, property_type, core_property_type;
 type shell_prop, property_type, core_property_type;
 type system_prop, property_type, core_property_type;
 type system_radio_prop, property_type, core_property_type;