After compliance security information is replicated into a CIA relational repository, the data can be used to do the following:
Service a set of compliance reports, which are distributed with the security product. These distributed reports are modeled to report on role-based security authorizations. Reports can help sites and auditors more easily analyze and report on compliance-related issues based on the roles defined within a site.
Service ad-hoc SQL queries. You enhance query performance by issuing ad-hoc SQL queries against compliance security information in the CIA relational repository, rather than directly against the mainframe security database.
Service customized security applications and reports. Every site has specific and unique needs, which require the ability to extract and use data in different ways. Sites can determine how to use the compliance security information in the repository to create their own applications.