Previous Topic: CA IDMS Centralized Security OverviewNext Topic: CA IDMS Centralized Security


Security Administration

In the data processing environment, security administration, whether performed by a full-time security administrator in a large shop or by a DBA in a small shop, is a vital component of corporate success.

Why Secure Your System?

You secure your system to do the following:

Security Strategy

A comprehensive corporate security strategy must account for all types of physical and electronic access to systems, including the following:

A strategy that has not considered all types of authorized and unauthorized access is open to intentional and accidental corruption.

Installing and Implementing Security

A security system needs to be installed and then implemented. A common approach to organizing this process is to designate the following:

CA IDMS Centralized Security Administration

The security approach described in the previous section is well suited for CA IDMS centralized security administration. Three important reasons are as follows: