The previous chapter introduced you to the concepts of default protection, controlled access, individual accountability, and separation of function. It also defined some of the key terms, such as logonids, access rules, and resources that we use to describe the components of CA ACF2 for z/VM.
This chapter builds on your understanding to provide more details about how CA ACF2 for z/VM secures your computer system.
This section contains the following topics:
What is the User Identification String?
Controlling Access to Resources
CACIS and the CA Standard Security Facility (CAISSF)
Controlling CP Commands and Diagnose Instructions
What is a Diagnose Limiting Rule Set?
Administering CA ACF2 for z/VM
Using the CA ACF2 for z/VM FullScreen Feature
Centralized and Decentralized Security Administration
How Does CA ACF2 for z/VM Monitor Activity?
When Does CA ACF2 for z/VM Create SMF Records?
Copyright © 2009 CA Technologies.
All rights reserved.
|
|