Establishing IMSplex security
The way you protect the IMS online system does not change for an IMS system in an IMSplex. The resources that can be protected and the facilities available to protect them are similar. The types of security issues that exist for a standalone IMS system also exist for an IMS system within an IMSplex.
- Determine what resources need to be protected.
- Determine which users need access to the resources.
- Determine the level of access to a resource that the users need.