The functional usage model and BRMS security considerations
As a BRMS administrator, you understand the importance of protecting user and system data from deletion, distortion, and theft. The BRMS functional usage model allows you to customize user access to BRMS functions (backup, recovery, and media management) and to the different components of each function. For example, you can give one user authority to change a control group, and another the authority only to use and view it. You can also use the functional usage model to grant all users access to a particular function or functional component.
To learn about how to secure your BRMS functions, consult Working with IBM i security controls.
BRMS provides another security option, the SETUSRBRM command, that allows you to reset a user or group profile by job category, *OPERATOR or *ADMINISTRATOR. Use the Set User Usage for BRM (SETUSRBRM) command as a starting point for controlling access to BRMS functions.
BRMS provides effective control over user access to BRMS functionality. IBM i security options prevent users from causing accidental or
intentional damage to your files or system. In addition, because BRMS ships its databases with a
default *PUBLIC *EXCLUDE authority, irreparable damage is unlikely to occur. 