Activating security in CICS and IMS.
An application which is not authorized is not getting security violations in Top Secret report.
The application runs in CICS and accesses information in IMS.
By default, CICS and IMS have internal security settings.
External security settings should be enabled on these products in order for Top Secret to secure them.
Need to activate CICS security and IMS security.
The following links documents show how to setup security in CICS. Here is the main topic that discusses setting up CICS.
Here is the section that is specific to security settings: CICS-resource-validation-and-auditing
Here is a section about IMS: