Activating Top Secret Security in CICS and IMS
search cancel

Activating Top Secret Security in CICS and IMS

book

Article ID: 74478

calendar_today

Updated On:

Products

Top Secret

Issue/Introduction

Activating security in CICS and IMS.

An application which is not authorized is not getting security violations in Top Secret report. 

The application runs in CICS and accesses information in IMS.

Cause

By default, CICS and IMS have internal security settings.

External security settings should be enabled on these products in order for Top Secret to secure them.

Resolution

Need to activate CICS security and IMS security.

The following documentation links show how to setup security in CICS.

Setting up CICS:
Implementing-in-CICS-and-other-interfaces
Security Settings:
CICS-resource-validation-and-auditing

Administering-transaction-security

Administering-cics-command-security

IMS:
Implementing-security-for-ims