# Security

- [Security overview](/security/security.md): The system implements a comprehensive security framework with multiple controls to ensure secure communication and protect user data in the cluster.
- [Obtain authentication tokens](/security/obtain-authentication-tokens.md)
- [Manage token expiration](/security/manage-token-expiration.md): Learn how to configure and manage token expiration settings to maintain a secure authentication environment aligned with best practices.
- [Manage account lockout threshold policy](/security/account-lockout-threshold-policy-management.md)
- [Manage KMS](/security/kms-management.md): Efficiently manage and safeguard WEKA system keys through strategic KMS configurations and best practices. Optimize security and operational resilience.
- [Manage KMS using GUI](/security/kms-management/kms-management.md): Explore procedures for managing Key Management System (KMS) integration with the WEKA system using the GUI.
- [Manage KMS using CLI](/security/kms-management/kms-management-1.md): Explore commands for managing Key Management System (KMS) integration with the WEKA system using the CLI.
- [Manage TLS certificates](/security/tls-certificate-management.md): Manage TLS certificates to encrypt data in transit and verify system identity, ensuring secure communication in the WEKA cluster.
- [Manage TLS certificates using GUI](/security/tls-certificate-management/manage-the-tls-certificate-using-the-gui.md)
- [Manage TLS certificates using CLI](/security/tls-certificate-management/manage-the-tls-certificate-using-the-cli.md)
- [Manage Cross-Origin Resource Sharing](/security/manage-cross-origin-resource-sharing.md)
- [Manage CIDR-based security policies](/security/manage-cidr-based-security-policies.md): Manage CIDR-based security policies to control access to WEKA clusters based on client IP address ranges, enhancing security and simplifying administration.
- [Manage login banner](/security/manage-the-login-banner.md): This page describes how to set a login banner displayed on the sign-in page.
- [Secure cluster membership with join secret authentication](/security/secure-cluster-membership-with-join-secret-authentication.md)
- [Security hardening](/security/security-hardening.md): Harden the security of a WEKA deployment. This guide covers Linux best practices, architectural requirements, port configurations, and auditing capabilities.
