Security administrators can use information in this section to understand how to configure and maintain a business continuity cluster in the most secure way possible.
Section 11.1, Security Features
Section 11.2, Security Configuration
Section 11.3, General Security Guidelines
Section 11.4, Security Information for Dependent Products