ACP and STIG applications and CA Top Secret

book

Article ID: 143668

calendar_today

Updated On:

Products

CA Top Secret

Issue/Introduction

Using ACP and STIG with Broadcom Top SECRET to generate security reports. 

 

Where can I get details about the Broadcom Top Secret protected resources that show up in the report?

Environment

Release : 16.0

Component : CA Top Secret for z/OS

Resolution

ACP and STIG viewers are not Broadcom applications and written by a third party.

 

Use the TSS WHOHAS and TSS WHOOWNS command to get more details about the ownership of the resources and who they have been permitted too.