This document describes how security is implemented within the APAN environment. Audience includes DOD coalition partners, information architects, IT generalists & managers evaluating the use of the APAN platform.