Previous Topic: Key Data Set Analysis

Next Topic: Key Data Set Analysis with CA Top Secret

Key Data Set Analysis with CA ACF2

In order to use the ACCESS command:

To analyse a data set, enter A on the line next to the entry.

CA Auditor invokes the ACCESS command which returns a list of applicable data set access rules and the rule lines within them that govern the security access policy for the data set.

Important! The output may not reflect all possible allowed access situations. For example, Logonid-based privileges such as NON-CNCL, PRIV-CTL, READALL, SECURITY, MAINT, PREFIX, and others are not in the output. A security audit should separately audit special, high-privileged users and other special situations such as the use of Multi-Level Security (MLS) granting access, a Logonid's SUSPEND status and the use of SAF and ACF2 user exits.

For information on the CA ACF2 ACCESS command, see the CA ACF2 for z/OS Administrator Guide.