13.2. Secure Installation and Configuration