This chapter contains the preliminary steps you should consider when planning for total CA ACF2 for z/VM security. Information in this chapter includes:
This section contains the following topics:
Appointing a Security Administrator
Appointing the Implementation Team (IT)
Preparing the Implementation Schedule
Distributing CA ACF2 for z/VM Documentation
Identifying Security Policies, Goals, and Objectives
Identifying Your Local Operating Environment
Selecting CA ACF2 for z/VM Options
|
Copyright © 2009 CA Technologies.
All rights reserved.
|
|