Previous Topic: The Change Log

Next Topic: Key Data Set Analysis with CA ACF2

Key Data Set Analysis

System data sets should be tightly controlled by an external security manager (ESM) such as:

The security controls for key libraries and other system data sets are an important auditing consideration. To obtain the security controls for a particular data set, use the ACCESS command to query the ESM.

CA Auditor uses the IRRSEQ00 (R_admin) security callable service to interface to the ESM. To use this security callable service: