This section contains specific instructions on how to configure and maintain a business continuity cluster in the most secure way possible.
Section C.1, Security Features
Section C.2, Security Configuration
Section C.3, Other Security Considerations