2.2.3 DC-to-DC Operations

This section describes the security and mutual authentication requirements for those DRS Remote Protocol operations that involve DC-to-DC interactions.<3>