Previous Topic: How Does CA Top Secret Work?Next Topic: Command Propagation Files


Where is Information Stored?

Information for CA Top Secret is stored among many files and records which work together to provide an integrated security software package.

CA Top Secret Files

The files used by CA Top Secret to secure an environment are:

Security File

This file is an encrypted security database consisting of the Security Records that contain all user and resource permissions and restrictions. When a user initiates a job or signs on to an online facility in a VM, MVS, or VSE environment, CA Top Secret obtains the user’s Security Record from the Security File, and places it in the user’s address space for the duration of the session.

Parameter File

This file stores and defines control options at initialization, and sets up the operating environment for CA Top Secret. As was discussed earlier, control options are the tools that allow you to modify and customize the security environment.

Facility Matrix Table

This table contains all the facilities defined to CA Top Secret. Each entry contains information about the specific attributes associated with a particular facility (like VM, TSO, and so on), and can be viewed and modified with the FACILITY control option.

Audit/Tracking File

This file records security-related events and can be shared among CPUs. These events include violations, job and session initiation, and resource access. You can also designate an optional, alternate Audit/Tracking File to increase the amount of information that can be stored before the file fills up and begins to wrap.

Backup File

This file stores the automatic daily backup of the Security File to ensure complete integrity of the security environment. The backup file is an exact copy of the Security File, as it existed at the time of last backup, and can be used if the Security File device becomes unavailable.

Recovery File

This file is a wraparound file that stores recent administrative commands depending on the size of the file allocated. The backup Security File with the application of select recovery file commands can completely restore a damaged Security File.