800 Adopting Zero Trust Strategy in CICS with Security Discovery
Project and Program:
Application Development,
CICS
Tags:
Proceedings,
2025,
SHARE Cleveland 2025
Abstract:For many years transaction security has been the main way of securing
applications. With DORA and Zero Trust, this is no longer sufficient and
presents a big problem for customers who need to migrate to resource based
security. In many cases users have been granted individual access to
transactions or are members of groups that are no longer required for their
role. This session will present an end-to-end description of the workflow of
CICS Security Discovery which is designed to solve that problem and help you
identify the roles, command and resource definitions in your production regions.
There will be a demo of the Security Discovery Explorer Editor which analyses
your existing security definitions, and production usage to identify roles, the
users in these roles and their access to applications and resources.
Back to Proceedings File Library