

Implementing Security for STC › About STC
About STC
Once CA Top Secret is installed, default definitions for all STCs have the TSS BYPASS attribute. When explicitly supplying STC protection, use the following considerations as guidelines:
- Required STC definitions must be applied (covered in Required STC Definitions).
- It is recommended that you protect STCs that either reference sensitive data or affect system integrity. In addition, you have the option of protecting whatever is appropriate at your particular site. At a minimum, no other STCs have to be defined.
- It is not necessary to protect STCs that do not reference sensitive data. Also, it is not necessary to protect STCs that run authorized programs which bypass security.
With CA Top Secret, you are able to provide the ideal situation for your community, whatever the scope or degree of STC security is required. STCs can be protected by three levels of security:
- ACID association
- Password
- Operator accountability
Copyright © 2013 CA Technologies.
All rights reserved.
 
|
|