Before implementing CA XCOM Data Transport for z/OS, a complete review of security issues should be made by those responsible for data security. This review should include those installing CA XCOM Data Transport, security administrators, auditors, and the systems staff involved in supporting the security software. Because of the expanded data access capabilities introduced by CA XCOM Data Transport, the security planning should address the need to define additional access privileges.
Consider the security environment at both ends when performing a CA XCOM Data Transport file transfer. Security validation for the local system is performed on the local system. Security validation for the remote system is performed on the remote system.
CA XCOM Data Transport software is subject to the same resident security checks as other z/OS applications. Therefore, the CA XCOM Data Transport started task needs a security profile that allows the full range of file transfers to be implemented; otherwise, even when the user has authorization to access a data set, a 913 abend code may be generated.
| Copyright © 2012 CA. All rights reserved. |
|