• The mention above to the 2005 BOL is also in the 2008 BOL. Though the reference in books online refer to protocol encryption, it is under the section for setting up a cluster and is referred as a way to use encryption with a cluster. Actually it is in a sub section for 'before' setting up the cluster.

    The debatable topic might be whether or not using encryption is part of securing a cluster.

    Cheers!