This section contains specific instructions on how to configure and maintain a business continuity cluster in the most secure way possible. It contains the following subsections:
Section 10.1, Security Features
Section 10.2, Security Configuration
Section 10.3, General Security Guidelines
Section 10.4, Security Information for Dependent Products