Examples of security strategies
You can implement security in HCL Workload Automation for Z in
many ways. Two extreme examples are shown below:
- A centralized strategy in which all security functions are controlled at a central site using fixed resources
- A decentralized strategy in which most security functions are delegated to users, and many subresources are defined.
Your security strategy probably falls somewhere between these two extremes.