Summary of CICS intersystem security

The security checks that CICS® performs does the following:
  • Restrict the access of remote systems to the CICS region
  • Restrict the access of requests to CICS resources
  • Restrict the access of particular users

Authenticating systems across SNA connections, Defining CICS link security, and Providing CICS user security tells you how to set points at which you can apply security checks in the processing of an incoming request. Review the description of security for local regions in Ensuring security in a CICS environment before you attempt to set up security for intercommunications.