System data sets should be tightly controlled by an external security manager (ESM) such as:
The security controls for key libraries and other system data sets are an important auditing consideration. To obtain the security controls for a particular data set, use the ACCESS command to query the ESM.
CA Auditor uses the IRRSEQ00 (R_admin) security callable service to interface to the ESM. To use this security callable service:
| Copyright © 2009 CA. All rights reserved. | Tell Technical Publications how we can improve this information |