Config security (2/20)

Config security