Previous Topic: Systems Software Area PersonnelNext Topic: Applications Area


Gaining Support

Security can be implemented for this area and for any area so that protection is provided without limiting the function required to handle the job. You can gain support by implementing security in this area so that system resources are protected and only authorized accounts are allowed to access them at specific access levels for required functions, such as VM maintenance. It is important to note that these resources are no longer available to anyone other than the system software area. They may continue to be available within the software area, but only at the needed access level so that system resources are not accidentally damaged.

As long as the system software personnel are not continually at cross-purposes with CA Top Secret while trying to do the job, they come to view the security product as a support feature rather than an inhibitor. This, of course, requires careful security design and implementation in this area.