Security considerations
Developer for z/OS® extends z/OS Explorer by providing additional functions, some of which interact with other system components and products, such as CICS®. Developer for z/OS specific security definitions are used to secure the provided functions.
The security mechanisms used by Developer for z/OS servers and services rely on the data sets and file systems it resides in being secure. This implies that only trusted system administrators should be able to update the program libraries and configuration files.
Developer for z/OS builds on top of IBM® Explorer for z/OS. For z/OS Explorer related information, see "Security consideration" in the IBM Explorer for z/OS Host Configuration Reference.