7. Security Considerations

In general, like any generic data transfer protocol, DCOM cannot regulate the content of the data that is transferred, nor is there any a priori method of determining the sensitivity of any particular piece of information within the context of any given ORPC.

Specifically, however, DCOM entirely leverages the security infrastructure defined by DCE RPC, which allows for various forms of authentication, authorization, and message integrity.

Further details TBS.