CICS Security for Dummies; Presented by a Dummy
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
SHARE Sacramento 2018 ,
2018
Following on from the Subsystem Security for dummies session, this session will dive deeper into how CICS can be secured with RACF (and the occasional mention of ACF/2 and Top Secret).
Will look at the SIT parameters, what's are the defaults and what is recommended. We will also take a look at some of the RACF profiles required to setup security in CICS.
Finally, we will look at some of the connectivity options available and how they should be secured.-Mark Wilson-RSM Partners
Back to Proceedings File Library