When security is particularly important, it is a good idea to design applications with an audit trail, so that all potentially sensitive actions are recorded automatically. There are some particular techniques useful for creating audit trails:
CRTJRNRCV JRNRCV(TRAIL) PUBAUT(*NONE)
| Copyright © 2011 CA. All rights reserved. | Tell Technical Publications how we can improve this information |