Previous Topic: Monitor Security

Next Topic: Data Set Access Validation

Command Security

TSO commands execute specific programs which need to be protected by CA Top Secret. To insure that an ACID does not gain access to a TSO command, establish ownership by adding the program to another ACID. At this point, additional users who want access to the program must be authorized to do so.