The processes and techniques used to secure a distributed system, including authentication, authorization, and encryption.