Previous Topic: Securing ResourcesNext Topic: Ownership vs. Authorization


Common Resources to Protect

CA Top Secret protects a wide variety of computer resources, but to protect them, CA Top Secret must know about them. The types of resources (such as data sets, volumes, terminals and minidisks) that CA Top Secret protects are listed in the Resource Descriptor Table (RDT). Many resource types are already automatically defined to the RDT at installation, however, you can add additional resource types (including site‑defined resources) by using the TSS ADDTO command.

Note: For a complete list of what is included in the RDT, see the Command Functions Guide.

The following list represents some of the most common types of resources CA Top Secret can protect.

Facilities

Resources

Commands

VM

Data sets

TSO commands

BATCH

Programs

<ROSCOE> commands

TSO

Terminals

VM CP commands

CICS

Readers

CA Product commands

CA IDMS

CPUs

 

STC

User resources

 

CA Roscoe

Operator commands

 

IMS

DASD volumes

 

Other

Tape volumes

 

 

VM resources

 

 

TSO resources

 

 

DB2 resources

 

 

CICS resources

 

 

IMS resources

 

 

CA IDMS resources