Securing the Cluster#

This section discusses cluster security issues that are exclusive to the ICE ClusterWare™ platform. We assume that the cluster administrator is familiar with security issues that are not solely related to ClusterWare clusters, such as securing the cluster from outside access, optionally enabling various Red Hat RHEL/CentOS functionalities for logging and auditing access to nodes and storage and for managing SELinux.