# Secure Your Data

Immuta allows you to secure your data through various access control policies you configure to mitigate compliance and security risks.

## [Getting started](https://documentation.immuta.com/2024.2/secure-your-data/getting-started-with-secure)

This section provides use cases to guide you through implementing Immuta Secure.

## [Introduction](https://documentation.immuta.com/2024.2/secure-your-data/secure-introduction)

This section provides a conceptual overview of Immuta Secure and its benefits.

## [Authoring policies in Secure](https://documentation.immuta.com/2024.2/secure-your-data/authoring-policies-in-secure)

This section provides how-to and references guides for authoring policies to enforce data access controls.

## [Domains](https://documentation.immuta.com/2024.2/secure-your-data/domains)

The how-to and references guides in this section illustrate how to use domains. Domains are containers of data sources that allow you to assign data ownership and access management to specific business units, subject matter experts, or teams at the nexus of cross-functional groups.

## [Projects and purpose-based access control](https://documentation.immuta.com/2024.2/secure-your-data/projects-and-purpose-based-access-control)

Projects combine users and data sources under a common purpose, which can then be used to restrict access to data and streamline collaboration.

## [Data consumers](https://documentation.immuta.com/2024.2/secure-your-data/data-consumers)

The guides in this section illustrate how to subscribe to data sources in Immuta, run health jobs, and complete other actions as a data source subscriber.
