

Administering Your Security Environment › Modifying Your Security Environment
Modifying Your Security Environment
TSS commands are used to build your security database. Control options are used to define your security environment. How your security environment is designed can make a major difference in how CA Top Secret responds to both resource access requests and security violations. Through control options a Security Administrator can tell CA Top Secret:
- How to process normally as well as under specific MODEs and circumstances
- What password selection rules and violation thresholds are in effect
- Which activities should be logged
- What actions should be taken after shutdown or maintenance
- Which features, facilities, and products are on the operating system and how they should be secured (see the “Administering Facility Security” chapter)
A complete discussion on control options and managing your security environment can be found in your Control Options and Implementation Guide, but for the sake of brevity, this chapter will concentrate on only the following control options:
- MODE (for modifying your CA Top Secret security mode)
- NEWPW (for designing password specifications)
- LOG (for indicating what security events to log, and how)
- VTHRESH (for setting the violation threshold)
- PTHRESH (for preventing “password guessing”)
Copyright © 2014 CA Technologies.
All rights reserved.
 
|
|