Previous Topic: What Does CA ACF2 for z/VM Do?Next Topic: SystemWide Logon Access with One Password


Protection by Default

No action is required to secure data or resources. All data and resources are protected until the owner of the data or a security administrator takes action to allow access. This approach provides the most effective type of security because it reduces the likelihood of exposures through omission of security controls. It also reduces the amount of work required to secure the environment.