Previous Topic: Credential and Monitoring SystemNext Topic: Obsolete Configuration Options


Removal of Obsolete Security Objects

We recommend that you identify and remove obsolete options.

Business Value:

Some of your defined options may remain in effect even though the original supporting business case is no longer relevant. You might need to substantiate each control to an auditor.

More Information:

For a list of control options, see the CA Top Secret for z/OS Control Options Guide.