This document provides guidelines that help you plan the effective implementation of CA Top Secret for z/VM. It presents all of the considerations for planning your security implementation in one convenient document. This enables you to review the entire security implementation project before you begin to plan for your organization. Recommendations are presented, along with tradeoffs, which you may consider when selecting among recommended options.
The recommendations are not merely “textbook” suggestions, but rather the result of observing what happens when the security implementation is not properly planned. Security implementation problems experienced by CA Top Secret customers who report them to the CA Top Secret support staff, are often a direct result of inadequate planning given to one or more of the critical steps discussed in this guide.
After reading this guide, you should be able to:
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|