Previous Topic: Specify Common ResourcesNext Topic: Security File Structure


Security File Design

Given the results of the user and resource inventory, and after studying the features available with CA Top Secret, you can design your CA Top Secret Security File. The design of your Security File is most effective if you use both your environment and CA Top Secret’s capabilities as input.

When designing the Security File:

These techniques simplify maintenance and help you find a file element quickly when you need it.