Security and auditing
In this chapter, we describe the business requirements for secure enterprise applications and how these can be addressed with the security and auditing capabilities provided by CICS. We describe capabilities that allow us to protect against the following items:
Access from clients who are not authenticated
Non authorized access to CICS resources
Exposure of confidential data
We describe the value of running applications inside CICS, taking advantage of the security capabilities provided by the System z architecture.
In ...

Get Architect's Guide to IBM CICS on System z now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.