This section contains the following topics:
Security File Recovery Strategy
Designating Backup-Responsible System
Managing Data Sets and Tape Backups
Selecting Host System(s) for Recovery
Reestablish the System after a Loss
Reconstructing the Security File
You should familiarize yourself with these steps and, in consultation with your Systems Programming staff, use this content as a guide to developing your own particular operating procedures and recovery strategy.
Implementation of a recovery strategy consists of the following parts:
While each of these steps may vary according to your particular needs or system configuration, all are essential components of an effective backup and recovery implementation.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|