Previous Topic: CA Top Secret Protects Ports Not HardwareNext Topic: Source


Limit Protection to Critical Terminals

It is recommended that you limit the number of terminals protected to those that are truly critical, such as dial-in ports, production scheduling ports, or end-user ports for sensitive applications. This may make your terminal maintenance more manageable.

Remember, CA Top Secret architecture is based on the user, and it is the user who is responsible and accountable for their actions no matter which terminal is used to access your corporate resources.