Describes how various K2 components can be secured against unauthorized use