Previous Topic: Creating the Security FileNext Topic: Determining the Security File Block Size


Security File Location

Isolate the security file on a device with nothing else on the disk. This device should be high performance DASD. We recommend that no other data reside on this device. Fill the remaining DASD space on the volume with a dummy data set. This action prevents someone with access to the volume from using the free space. Protect this data from access. If isolating the security file is not an option, ensure that any other data placed on the device is not used during prime time business hours.