Home > Storage > ObjectScale and ECS > Product Documentation > ECS Cyber Protection Suite Reference Architecture > ECS security configuration and considerations
Many of the concepts for cyber protection overlap with general ECS security best practices and considerations. These concepts are applicable to other security threats and have a broader envelope of protection. For information about ECS security considerations, see ECS Security Configuration and Hardening Guide.