Previous Topic: Security is a Global ConcernNext Topic: Remaining Chapters


Security Implementation is Ongoing

The security implementation never ends. After total implementation of CA Top Secret, you may find that your use of CA Top Secret must continually adjust to reflect changes that occur within your installation. Your CA Top Secret implementation is just as dynamic as your data processing environment. It requires continual analysis, review, and modification to properly protect your installation.