Previous Topic: Utility ProgramsNext Topic: Organizing for Security


Planning the Implementation

This chapter contains the preliminary steps you should consider when planning for total CA ACF2 for z/VM security. Information in this chapter includes:

This section contains the following topics:

Organizing for Security

Appointing a Security Administrator

Appointing the Implementation Team (IT)

Preparing the Implementation Schedule

Distributing CA ACF2 for z/VM Documentation

Identifying Security Policies, Goals, and Objectives

Identifying Your Local Operating Environment

Selecting CA ACF2 for z/VM Options

General Planning Information