Security administrators can use information in this section to understand how to configure and maintain a business continuity cluster in the most secure way possible.
Section 13.1, Security Features
Section 13.2, Security Configuration
Section 13.3, General Security Guidelines
Section 13.4, Security Information for Dependent Products