Security and auditing
In this chapter, we describe the business requirements for secure enterprise applications and how these can be addressed with the security and auditing capabilities provided by CICS. We describe capabilities that allow us to protect against the following items:
•Access from clients who are not authenticated
•Non authorized access to CICS resources
•Exposure of confidential data
We describe the value of running applications inside CICS, taking advantage of the security capabilities provided by the System z architecture.