This chapter provides information about how SAKA is secured and what a site needs to be aware of to preserve the security of that environment.