Securing

CICS® uses an external security manager, such as RACF®, to make CICS systems, and the resources in those systems, secure against unauthorized access. Use this information to plan and implement security across your CICS systems.

For information about how you can intervene in security processing, see Customizing security processing.