This content has moved to /doc/book/security/controller-isolation/agent-to-controller/