Security commands are used to create, change, or list details about clustered system (system) encryption features.