The way you set up security in your Control-M environment largely depends on your setup and your security needs. The following diagram depicts a typical workflow:
SSL Management