Securing DB/DC and DCCTL dependent regions and their resources

It is important to protect dependent regions. There are two approaches to securing a dependent region: preventing the unauthorized scheduling of application programs in the dependent region and preventing the unauthorized use of resources by those programs after they have been scheduled.

The following list describes the different types of dependent regions and the resources that can be protected for each:

IMS supports Resource Access Security (RAS) to protect dependent regions.