Security administrators can use information in this section to understand how to configure and maintain a business continuity cluster in the most secure way possible.
Section 14.1, Security Features
Section 14.2, Security Configuration
Section 14.3, General Security Guidelines
Section 14.4, Security Information for Dependent Products