Covers authentication, authorization, LBAC, RCAC, audit policies, and encryption configuration. The reference for all security features demonstrated in Section 36.6.