Configuring security It is important to manage your cluster security, vulnerability, and risk assessment.