Security in BTS

Security considerations for CICS® business transaction services are the authority to access BTS resources, the user IDs under which a process and its constituent activities run, the authority to attach the process and its constituent activities and the authority to use BTS system programming commands.

CICS security is described in detail in Securing. Users of external security managers (ESMs) other than the Resource Access Control Facility (RACF®) must read this information with the documentation for their own ESM.