Many sites use an alternative conversion method to place CA ACF2 for z/VM into RULE mode at an early stage, then allow or log specific requests using the $MODE control statement in the rule sets. The mode enforced for a given access is determined by any of the following:
This lets you selectively phase in protection for different groups (departments or geographical locations) or for different data (production versus test).
|
Copyright © 2009 CA Technologies.
All rights reserved.
|
|