Previous Topic: Security for a Multi-System EnvironmentNext Topic: Region Violations


Introduction

Security requirements for ISC or MRO are similar to the security requirements of a single, stand‑alone CICS region. For background information about establishing ISC and MRO regions, see the IBM Intercommunication Facilities Guide.

You can define additional levels of security for both MRO and ISC environments. Details on how these levels relate to CA Top Secret security are described in the following sections. These levels are: