This chapter describes the procedure used to implement the Control‑M/Tape security interface. It is recommended that you first review the explanations below on the elements that are protected in Control‑M/Tape and then proceed to the step-by-step instructions.