CICS transactions subject to security checking
6.2 and later Applies to 6.2 and later.
To conform with a zero trust strategy and various compliance regulations such as PCI-DSS,
as of CICS® TS 6.2, all CICS
transactions, excluding CJXA and CICSPlex® SM transactions (CO**), are defined with CMDSEC(YES) and
RESSEC(YES). This might impact your security definitions.
The following table lists CICS Category 1 transactions that require extra security to be configured.
| Transactions | Recommended security configuration |
|---|---|
| CPLT | Security for PLT programs. See PLTPIUSR. |
| CWXN | Security for static responses. See Resource-level security for static responses using document templates. |
The following table lists CICS Category 2 transactions that require extra security to be configured in addition to transaction security.
| Transactions | Recommended security configuration |
|---|---|
| CEBR | Users need access to any TS queue that they browse. |
| CEDA | Users need surrogate authority to install definitions that contain user IDs. |
| CESD | See Security for CICS shutdown. |
| CJSA | Configure security for Java applications. Learn more: Security for Java applications |
| CKAM | Users need to define transaction security by specifying
the transaction attribute for the MQMONITOR resource. See Defining and installing MQMONITOR resources. The specified transaction can be the default CKTI, user MQ adapter transaction, or CKBR. See Setting up an MQMONITOR resource for the CICS-MQ bridge. Learn more: Security for the CICS-MQ bridge, Security for the CICS-MQ adapter |
| CKBC | Users need to define security on transactions specified in the request message body. See DPL message structure for the CICS-MQ bridge. |
| CKBP | Users need to define security on transactions specified in the request message body. See DPL message structure for the CICS-MQ bridge. |
| CKBR | Users need permission to run transaction CKBC or CKBP. Learn more: Security for the CICS-MQ bridge |
| CKCN | Users need permission to run transaction CKRT. |
| CKDP | Users need permission to run transaction CKRT. |
| CKQC |
Users need permission to run transactions CKCN, CKDL, CKRS, CKSD, and CKSQ. Users might need permission to run transaction CKAM when starting or stopping the MQ connection. See Starting a CICS-MQ connection and Stopping a CICS-MQ connection. Learn more: Security for the CICS-MQ adapter |
| CKRS | Users need permission to run transaction CKRT. |
| CKRT | Users need permission to run transactions CKBM and CKDB. |
| CKSD | Users need permission to run transaction CKRT. |
| CKSQ | Users need permission to run transactions CKTI and CKRT. |
| CKTI | Users need to define transaction security by specifying the transaction attribute for the MQMONITOR resource. See Defining and installing MQMONITOR resources. |
| CLER | Users need READ and UPDATE access to the temporary storage queues (TS QUEUEs) whose names
begin with TR1. |
| CPIH | Configure security for web services. Learn more: Security for SOAP web services |
| CPIL |
Users need to configure permission of transactions driven by CPIL. Note: CPIL drives CPIQ by default, but you can specify a different transaction or user in the URIMAP
resource definition. URIMAP routing determines which user ID and transaction will be used. For more
information, see URIMAP resources and Routing provider mode CICS Web Services.
|
| CPIQ | Configure security for web services. Learn more: Security for SOAP web services |
| CPMI | Configure security for the intercommunication method in use. See Implementing LU6.2 security. |
| CRPA | See CRPC. |
| CRPC | Users need to configure security for commands issued by this transaction, such as SYSTEM for the INQUIRE SYSTEM command, and any other related resources, including any programs that are called (see the DFHRPC row in Table 1 in CICS-supplied groups not in DFHLIST). |
| CRPM | See CRPC. |
| CSHR | Configure security for the intercommunication method in use. See Intercommunication security, Security for MRO, Security for IPIC (IP interconnectivity), and Implementing LU6.1 security. |
| CSMI | Configure security for the intercommunication method in use. See Intercommunication security, Security for MRO, Security for IPIC (IP interconnectivity), Implementing LU6.2 security, and Implementing LU6.1 security. |
| CSM1 | Configure security for the intercommunication method in use. See Intercommunication security, Security for MRO, Security for IPIC (IP interconnectivity), Implementing LU6.2 security, and Implementing LU6.1 security. |
| CSM2 | Configure security for the intercommunication method in use. See Intercommunication security, Security for MRO, Security for IPIC (IP interconnectivity), Implementing LU6.2 security, and Implementing LU6.1 security. |
| CSM3 | Configure security for the intercommunication method in use. See Intercommunication security, Security for MRO, Security for IPIC (IP interconnectivity), Implementing LU6.2 security, and Implementing LU6.1 security. |
| CSM5 | Configure security for the intercommunication method in use. See Intercommunication security, Security for MRO, Security for IPIC (IP interconnectivity), Implementing LU6.2 security, and Implementing LU6.1 security. |
| CWBA | See Resource and transaction security for application-generated responses. |
| CVMI | Configure security for the intercommunication method in use. See Implementing LU6.2 security. |
- CADP
- CDBC
- CDBF
- CDBI
- CDBM
- CDBQ
- CDBT
- CDFS
- CECS
- CEDB
- CEDC
- CEOT
- CETR
- CIDP
- CKBM
- CKDL
- CLDM
- CMSG
- CPIA
- CPIW
- CRTE
- CRTX
- CSFE
- CWTO
- CXSD
- DSNC
Obsolete or stabilized transactions also have command security and resource security enabled. Use them at your own risk. For a complete list of CICS transactions, see List of CICS transactions.