diff --git a/lib/cache.h b/lib/cache.h
index f93fe3a89179f2fe66c420bb3a461bc5d867dce3..dbfdd69832fb54dd254ab0f2a187daf27aa5a700 100644
--- a/lib/cache.h
+++ b/lib/cache.h
@@ -23,7 +23,6 @@
 enum kr_cache_tag {
 	KR_CACHE_RR   = 'R',
 	KR_CACHE_PKT  = 'P',
-	KR_CACHE_SEC  = 'S',
 	KR_CACHE_SIG  = 'G',
 	KR_CACHE_USER = 0x80
 };
diff --git a/lib/layer/pktcache.c b/lib/layer/pktcache.c
index ec0440266758c782ea567921a9c2fa63280ec8fa..7ba8abc5e2f12553ffe850895204110efe5ee908 100644
--- a/lib/layer/pktcache.c
+++ b/lib/layer/pktcache.c
@@ -26,11 +26,6 @@
 #define DEFAULT_MAXTTL (15 * 60)
 #define DEFAULT_NOTTL (5) /* Short-time "no data" retention to avoid bursts */
 
-static inline uint8_t get_tag(struct kr_query *qry)
-{
-	return (qry->flags & QUERY_DNSSEC_WANT) ? KR_CACHE_SEC : KR_CACHE_PKT;
-}
-
 static uint32_t limit_ttl(uint32_t ttl)
 {
 	/* @todo Configurable limit */
@@ -50,14 +45,19 @@ static void adjust_ttl(knot_rrset_t *rr, uint32_t drift)
 }
 
 static int loot_cache_pkt(struct kr_cache_txn *txn, knot_pkt_t *pkt, const knot_dname_t *qname,
-                          uint16_t rrtype, uint8_t tag, uint32_t timestamp)
+                          uint16_t rrtype, bool want_secure, uint32_t timestamp)
 {
 	struct kr_cache_entry *entry = NULL;
-	int ret = kr_cache_peek(txn, tag, qname, rrtype, &entry, &timestamp);
+	int ret = kr_cache_peek(txn, KR_CACHE_PKT, qname, rrtype, &entry, &timestamp);
 	if (ret != 0) { /* Not in the cache */
 		return ret;
 	}
 
+	/* Check that we have secure rank. */
+	if (want_secure && entry->rank == KR_RANK_INSECURE) {
+		return kr_error(ENOENT);
+	}
+
 	/* Copy answer, keep the original message id */
 	if (entry->count <= pkt->max_size) {
 		/* Keep original header and copy cached */
@@ -84,12 +84,13 @@ static int loot_cache_pkt(struct kr_cache_txn *txn, knot_pkt_t *pkt, const knot_
 }
 
 /** @internal Try to find a shortcut directly to searched packet. */
-static int loot_cache(struct kr_cache_txn *txn, knot_pkt_t *pkt, uint8_t tag, struct kr_query *qry)
+static int loot_cache(struct kr_cache_txn *txn, knot_pkt_t *pkt, struct kr_query *qry)
 {
 	uint32_t timestamp = qry->timestamp.tv_sec;
 	const knot_dname_t *qname = qry->sname;
 	uint16_t rrtype = qry->stype;
-	return loot_cache_pkt(txn, pkt, qname, rrtype, tag, timestamp);
+	const bool want_secure = (qry->flags & QUERY_DNSSEC_WANT);
+	return loot_cache_pkt(txn, pkt, qname, rrtype, want_secure, timestamp);
 }
 
 static int peek(knot_layer_t *ctx, knot_pkt_t *pkt)
@@ -115,8 +116,7 @@ static int peek(knot_layer_t *ctx, knot_pkt_t *pkt)
 	}
 
 	/* Fetch either answer to original or minimized query */
-	uint8_t tag = get_tag(qry);
-	int ret = loot_cache(&txn, pkt, tag, qry);
+	int ret = loot_cache(&txn, pkt, qry);
 	kr_cache_txn_abort(&txn);
 	if (ret == 0) {
 		DEBUG_MSG("=> satisfied from cache\n");
@@ -166,7 +166,7 @@ static int stash(knot_layer_t *ctx, knot_pkt_t *pkt)
 	struct kr_query *qry = kr_rplan_current(rplan);
 	/* Cache only answers that make query resolved (i.e. authoritative)
 	 * that didn't fail during processing and are negative. */
-	if (!(qry->flags & QUERY_RESOLVED) || qry->flags & QUERY_CACHED || ctx->state & KNOT_STATE_FAIL) {
+	if (qry->flags & QUERY_CACHED || ctx->state & KNOT_STATE_FAIL) {
 		return ctx->state; /* Don't cache anything if failed. */
 	}
 	/* Cache only authoritative answers from IN class. */
@@ -200,7 +200,7 @@ static int stash(knot_layer_t *ctx, knot_pkt_t *pkt)
 	};
 
 	/* Stash answer in the cache */
-	int ret = kr_cache_insert(&txn, get_tag(qry), qname, qtype, &header, data);	
+	int ret = kr_cache_insert(&txn, KR_CACHE_PKT, qname, qtype, &header, data);	
 	if (ret != 0) {
 		kr_cache_txn_abort(&txn);
 	} else {