Configuring more sophisticated security

This topic describes decisions you can make to achieve more elaborate levels of security.