Some of the subjects which can be addressed and the intended audiences are as follows:
For systems software personnel: CA Top Secret installation and information on how CA Top Secret interfaces with the operating system.
For systems software and applications development personnel: information on how CA Top Secret can be used to assist in the design of new or existing system and application facilities through the CA Top Secret Application Interface.
For the auditors or any area requiring the ability to audit: information on how to use CA Top Secret to monitor the data processing environment without impacting the operation of the shop.
For all users, information on ACID and password requirements includes the following:
How often the password is changed, and the procedure which must be followed to revise it.
Under what circumstances an ACID may be suspended, and what to do about it.
For all users: what kind of violation messages they may encounter, and what action is required for each.
For all users: the nature of the CA Top Secret Last Used Message and instructions on how to verify that the last use of their ACID was legitimate.