Isolate the security file on a device with nothing else on the disk. This device should be high performance DASD. We recommend that no other data reside on this device. Fill the remaining DASD space on the volume with a dummy data set. This action prevents someone with access to the volume from using the free space. Protect this data from access. If isolating the security file is not an option, ensure that any other data placed on the device is not used during prime time business hours.
|
Copyright © 2013 CA Technologies.
All rights reserved.
|
|