Security administrators and auditors must know at a glance the origin of their data. The Systems category in the Investigator provides an inventory of all your security systems that are managed through CA Chorus for Security and Compliance Management.
Example: Identify the data loaded in the product
You want to identify the origin of the data that is loaded into CA Chorus as part of the CIA load process. You know that it is from CA ACF2, but you want to identify the specific systems. This information helps you see the breadth of the data available in the Investigator.
The list of CA ACF2 systems that are loaded in CA Chorus appears.
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|