You can limit access to the security configuration files by using the permissions feature of the operating system. Only select users should be allowed access to the files. The users must include those who launch the applications requiring access to the authentication records.