Previous Topic: For More InformationNext Topic: Decide on Centralized or Decentralized Security


Implementation Considerations

This chapter describes decisions that you must make regarding implementing CA Top Secret Option for DB2. You might have already made many of these decisions when you installed and implemented CA Top Secret, or you might be in the process of making the decisions. This chapter helps you address the decisions from a DB2 perspective.

The following practices can help you successfully implement CA Top Secret Option for DB2:

This section contains the following topics:

Decide on Centralized or Decentralized Security

Appoint Your Implementation Team

Plan and Coordinate Your Implementation Schedule

Distribute Documentation

Provide Adequate Training

Review and Tailor Security Policy

Identify Your Operating Environment

Evaluate Use of Exits

Evaluate Who Should Get Access to What

Determine Appropriate Security Mode

Identify Users

Identify DB2 Subsystems

Identify DB2 Resources

Identify and Secure DB2 Data Sets

Protect Distributed Data Facility (DDF) Resources

Test PERMITs Using TSSSIM (optional)