Top Secret will first check BYPASS list.
If on the list, the user will be granted access and no further security check will be done. This saves Top Secret from doing a full security check which saves overhead and I/O.
If not on the list, a normal security check will be done to determine if the user has access to the CICS resource.