Github user HeartSaVioR commented on a diff in the pull request:
https://github.com/apache/storm/pull/2562#discussion_r169179737
--- Diff: docs/SECURITY.md ---
@@ -17,6 +17,9 @@ Authentication and Authorization. But to do so usually
requires
configuring your Operating System to restrict the operations that can be
done.
This is generally a good idea even if you plan on running your cluster
with Auth.
+Meaning to say, Storm's OS level security is based on running Storm
processes with proper OS account,
--- End diff --
Updated.
---