We recommend a comprehensive approach to system security that ensures functional and data set security. A carefully planned security program ensures the proper levels of access and data set security.
You should address security during the final testing of your first CA Endevor SCM application. The initial setup and testing steps for implementing a new application should not be disrupted by overly restrictive security rules.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|