Previous Topic: Departmental Security Coordinator - ResponsibilitiesNext Topic: Impact Areas


Introduction to CA Top Secret

Data security is a key issue with the First Tennessee National Corporation. Computer information resources, whether in the form of programs or data, are viewed as corporate assets and therefore must be protected from either intentional, or more commonly unintentional, destruction and/or misuse.

CA Top Secret was selected by First Tennessee over IBM's RACF and CA‑ACF2 because of ease of installation and low overhead requirements. CA Top Secret places no hooks into the z/OS operating system and is therefore independent of normal z/OS maintenance. It does, however, utilize the standard IBM RACF interface for inter‑system communications.

Although the implementation of this package will necessitate many changes in our current environment, and the related procedures, every effort will be made to minimize disruption and loss of productivity.