Naming standards are the sort of thing that everyone sees the need for but no one wants to develop or enforce. If your organization has successfully designed and enforced standards prior to the security implementation, your implementation becomes much easier since you are able to use CA Top Secret’s minidisk and data set prefixing or masking capabilities to define resources. This relieves you from having to define each individual resource, by allowing you to group resources together by prefix or pattern.
If you are implementing security in an organizations that has not enforced standards, or if you have no standards at all, your implementation may be more complicated because you may have to create more resource definitions.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|