DB/DC and DCCTL resources that can be protected
Before you decide what security facilities to use in designing a secure IMS system, you should know which resources within the system need protection.
In other words, you should decide what to protect before you decide how to protect it.
The following resources can be protected in the DB/DC and DCCTL environments:
- IMS control region
- IMS online system
- IMS system data sets
- Transactions
- Commands
- Program specification blocks (PSBs)
- Online application programs
- Databases
- Dependent regions
- BMP (batch message processing) region
- IFP (IMS Fast Path) region
- JBP (Java™ batch processing) region
- JMP (Java message processing) region
- MPP (message processing program) region
- Terminals
- Logical terminals (LTERMs)
- Physical terminals (PTERMs)
- Master terminals