This chapter describes decisions that you must make regarding implementing CA Top Secret Option for DB2. You might have already made many of these decisions when you installed and implemented CA Top Secret, or you might be in the process of making the decisions. This chapter helps you address the decisions from a DB2 perspective.
The following practices can help you successfully implement CA Top Secret Option for DB2:
This section contains the following topics:
Decide on Centralized or Decentralized Security
Appoint Your Implementation Team
Plan and Coordinate Your Implementation Schedule
Review and Tailor Security Policy
Identify Your Operating Environment
Evaluate Who Should Get Access to What
Determine Appropriate Security Mode
Identify and Secure DB2 Data Sets
Protect Distributed Data Facility (DDF) Resources
Test PERMITs Using TSSSIM (optional)
|
Copyright © 2011 CA Technologies.
All rights reserved.
|
|