Coordination Under Security Constraints