Scenario: Securing data access with RACF facilities at Spiffy Computer

The scenario describes a simple approach for implementing RACF security at Spiffy Computer Company.

This scenario assumes that you have already taken performed the following actions:

You should base your security plan, techniques, and procedures on your actual security objectives; do not view this sample security plan as an exact model for your security needs. Instead, use it to understand various possibilities and address problem areas that you might encounter when you move from Db2 security to RACF security.