Use Security Configurations to Set Up Cluster Security