Security for the IMS catalog

The IMS catalog is a system database so take every precaution to protect it from unauthorized access or corruption. If the IMS catalog is corrupted in anyway, access to all IMS databases could be affected.

Use command security to prevent unauthorized changes to the status and availability of the IMS catalog.

Protect the catalog database data sets from unauthorized access.

Only update the IMS catalog by using the appropriate IMS utilities.