Previous Topic: User-Based Logging ControlsNext Topic: Credential and Monitoring System


Entitlement-Based Logging Controls

We recommend that you define specific permissions to generate log entries to determine when a user accesses a resource.

Business Value:

This practice lets you customize the data that appears in your logs and to track access to a resource. When a data set or resource access is allowed, the security administrator controls the circumstances in which logging records are written. By default, CA Top Secret for z/OS logs failed access attempts or access attempts allowed by a privilege.

Additional Considerations:

The ACTION(AUDIT) keyword generates a log entry.

More Information:

For a detailed discussion of entitlement-based controls, see the CA Top Secret for z/OS Command Functions Guide.