Previous topic |
Next topic |
Contents |
Contact z/OS |
Library |
PDF
Deciding what to protect z/OS Security Server RACF Security Administrator's Guide SA23-2289-00 |
|
Every installation has varying amounts of confidential data and varying degrees of confidentiality.
For example, a development laboratory might be primarily concerned
with the confidentiality of new products, whereas a bank or an insurance
agency would be concerned with the confidentiality of its customers'
records. Generally speaking, though, all data falls into one of the
following categories:
Most data falls into the last category. Obviously, the data in the first category must be protected. What should also be considered is how to protect the data that ought to be protected in a simple yet effective manner, in a way that is transparent to the user of this data. The implementation team does a risk evaluation of the installation's data to determine which data needs what level of protection. The task of protecting large quantities of data can take on significant proportions unless you can acquire this protection automatically. In the case of RACF®, protecting data is quite simple and, after the controls are in place, practically free from administrative overhead. |
Copyright IBM Corporation 1990, 2014
|