CA Top Secret also includes a recovery mechanism based on the DASD backup and the Recovery File. This procedure is implemented and tested before serious security maintenance begins so that all Security File updates can be recovered. See the Implementation Guide for further details.
It is strongly recommended that you use the CA Top Secret backup and recovery procedures to protect your CA Top Secret Security File. These procedures were designed for quick, accurate, and dependable recovery.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|