Protect your data integrity and security by configuring security for all user levels. Surround SCM can be configured to provide as much, or as little, security as needed. Access to Surround SCM commands, such as promoting a branch, is controlled by the security set for each group. You can also configure repository and branch security.