CICS Security for Dummies; Presented by a Dummy
Project and Program: Enterprise Data Center
, Security and Compliance
, SHARE Sacramento 2018
Following on from the Subsystem Security for dummies session, this session will dive deeper into how CICS can be secured with RACF (and the occasional mention of ACF/2 and Top Secret).
Will look at the SIT parameters, what's are the defaults and what is recommended. We will also take a look at some of the RACF profiles required to setup security in CICS.
Finally, we will look at some of the connectivity options available and how they should be secured.-Mark Wilson-RSM Partners
Back to Proceedings File Library