Security and auditing
In this chapter, we describe the business requirements for secure enterprise applications and how these can be addressed with the security and auditing capabilities provided by CICS. We describe capabilities that allow us to protect against the following items:
Access from clients who are not authenticated
Non authorized access to CICS resources
Exposure of confidential data
We describe the value of running applications inside CICS, taking advantage of the security capabilities provided by the System z architecture.
In ...

Get Architect's Guide to IBM CICS on System z now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.