Scenario: Securing data access with RACF facilities at Spiffy Computer
The scenario describes a simple approach for implementing RACF security at Spiffy Computer Company.
This scenario assumes that you have already taken performed the following actions:
- Performed all actions in Scenario: Securing data access with Db2 facilities at Spiffy Computer
- Installed the RACF access control module
You should base your security plan, techniques, and procedures on your actual security objectives; do not view this sample security plan as an exact model for your security needs. Instead, use it to understand various possibilities and address problem areas that you might encounter when you move from Db2 security to RACF security.