Previous Topic: Transaction Level SecurityNext Topic: Select Type of Activity for Logging


Resource Level Security

The following considerations apply to resource level security:

You may find it appropriate to plan an implementation strategy that combines both forms of security. Many organizations initially address transaction level security, and as time permits gradually implement resource level security. Since these facilities allow gradual implementation of resources, even in FAIL mode, this may be the most effective approach for the implementation of CICS, IMS, and CA‑IDMS security for your installation.