Previous Topic: CA Top Secret ScopesNext Topic: Roles and Users by Resource


Rules

The Rules category lets you view access, resource rules, and rule lines that are associated with data sets. You can also view resources such as TSO accounts, procedures, commands, facilities, and IMS transactions. The CA Chorus for Security and Compliance Management supports rules and rule lines for CA ACF2 and CA Top Secret.

After you select a row of data, more granular information appears in the Details pane at the bottom of the Investigator.

Example: Identify the scope of a change to the CA ACF2 rule

You have received a request to modify a rule. You recognize that this rule can be widely used, but you want to confirm. Doing so lets you determine the impact and decide the best time to implement the change.

  1. Add the Investigator module to your dashboard, and click Start New Investigation.
  2. Select Security from the drop-down list.
  3. Select Definitions, Rules from the folder list.
  4. Click View Filter (magnifying glass icon).
  5. Filter the data to locate the rule to be changed.
  6. Select the rule-line in the table, and select Show All Users from the Action pane.

    The results indicate that this rule is widely used. Based on this information, you plan to suggest to your manager that you implement this change during off hours.