DB/DC and DCCTL resources that can be protected

Before you decide what security facilities to use in designing a secure IMS system, you should know which resources within the system need protection.

In other words, you should decide what to protect before you decide how to protect it.

The following resources can be protected in the DB/DC and DCCTL environments: