Previous Topic: Securing z/OS UNIXNext Topic: Using the Automatic Security File Backup


Identifying Cross-System Connectivity Controls

We recommend that you review your overall security enterprise periodically to determine what security relationships exist, if any, between these systems, and how activating any of the CA Top Secret processing options might be beneficial.

Business Value:

Sharing of administrative activity changes can provide considerable benefit in the form of business process simplification through automation. CA Top Secret has control options that enable it to share the following data and resources:

Additional Considerations:

Review existing instances of cross-system connectivity in the following ways: