This content has moved to /doc/book/operating-jenkins/security