Administration Guide › ESM Support (CA VM:Director only) › ESM Command Authorization › Security Impact
If the rules defined for an ESM are equivalent to the rules defined for the native application command authorization facility, then the two configurations have the same level of security.