When security is particularly important, it is a good idea to design applications with an audit trail, so that all potentially sensitive actions are recorded automatically. There are some particular techniques useful for creating audit trails:
CRTJRNRCV JRNRCV(TRAIL) PUBAUT(*NONE)
|
Copyright © 2014 CA.
All rights reserved.
|
|