Security Guide Secure Installation and Configuration 1 Secure Installation and Configuration Plan for a secure installation and follow recommended deployment topologies when applicable. General Security Principles Understand Your Environment Recommended Deployment Topologies Securely Install the Key Management Appliance Network Connections and the KMA