Activating security in CICS and IMS.
An application which is not authorized is not getting security violations in Top Secret report.
The application runs in CICS and accesses information in IMS.
By default, CICS and IMS have internal security settings.
External security settings should be enabled on these products in order for Top Secret to secure them.
Need to activate CICS security and IMS security.
The following documentation links show how to setup security in CICS.
Setting up CICS:
Implementing-in-CICS-and-other-interfaces
Security Settings:
CICS-resource-validation-and-auditing
Administering-transaction-security
Administering-cics-command-security
IMS:
Implementing-security-for-ims