Overview of DB/DC and DCCTL security

When you initiate security safeguards, you must balance requirements between those responsible for the security of resources and those users who legitimately need access to those resources.

Because the person who is assigned to resource security is held responsible for resources that might be compromised, that person should not allow easy access to dominate protection measures. However, users performing their assigned tasks need convenient access to the resources. The users and the security specialist should work out a balanced approach between the ease of resource access and the complexity of protecting that resource.

In an IMS system, two types of security exist. You can address one or both types:
  • Securing the kind of resource to which a user has access. For example, a user might be allowed access to the Part database but not to the Customer Order database.
  • Securing what the user can do to the resource after that user has access to it. For example, a user might be allowed to read a file but not to update it.