We recommend that you define specific permissions to generate log entries to determine when a user accesses a resource.
Business Value:
This practice lets you customize the data that appears in your logs and to track access to a resource. When a data set or resource access is allowed, the security administrator controls the circumstances in which logging records are written. By default, CA Top Secret for z/OS logs failed access attempts or access attempts allowed by a privilege.
Additional Considerations:
The ACTION(AUDIT) keyword generates a log entry.
More Information:
For a detailed discussion of entitlement-based controls, see the CA Top Secret for z/OS Command Functions Guide.
|
Copyright © 2010 CA Technologies.
All rights reserved.
|
|