This content has moved to
/doc/book/security/securing-jenkins/