How does Alert/CICS secure CICS resources?
Alert/CICS secures CICS resources by intercepting requests and validating them against defined security rules. It controls access to transactions, programs, files, and BMS maps.
How is Alert/CICS administered?
Alert/CICS uses an online menu interface for administration, allowing real-time modification of security rules and user permissions. Configuration files store security definitions and system parameters.
What authentication methods are supported?
Alert/CICS supports RACF, CA-ACF2, and CA-Top Secret for authentication. It leverages these external security managers for user validation and authorization.
What audit/logging capabilities exist?
Alert/CICS provides detailed audit logging of security events, including access attempts, rule violations, and administrative changes. These logs can be used for security monitoring and compliance reporting.