Previous Topic: Evaluate Use of ExitsNext Topic: Determine Appropriate Security Mode


Evaluate Who Should Get Access to What

CA Top Secret Option for DB2 permissions grant access to all DB2 resources, such as databases, tables, and system privileges. Before you can write and implement CA Top Secret Option for DB2 PERMITs, you must be a security administrator or be PERMITted authority through a TSS ADMIN command.

To make your CA Top Secret Option for DB2 permissions as effective as possible, answer these questions before you start writing the PERMITs:

After you answer these types of questions, you can begin to construct PERMITs.

We recommend that you use the conversion utility to create a set of general rules. Then you can edit these rules to be more specific. See the “Conversion Utility” chapter for more information about the conversion utility.