Perform product administration, handle backup and recovery, protect resources and facilities.
The security administrator:
- Is the focal point of security for your site
- Is responsible for implementing and maintaining system security
- Defines users, resources, access levels, and facilities
- Controls the security environment by using control options and TSS commands
- Monitors resource access violations with the auditing, tracking, and reporting options
- Must understand how CA Top Secret works and how best to implement security for your system
- Acts as the liaison between CA Top Secret and the users who need to access the facilities and resources it secures
The security administrator's role is determined by:
- The scope of authority (the entire installation or a single department within that installation)
- The designated administrative authorities (create ACIDs, run reports, change control options)
- The security needs of the site
For example, you might design one security administrator whose sole purpose is to create and maintain ACIDs, and another security administrator who is responsible for maintaining resources and the Resource Descriptor Table (RDT). Or you might create a “backup MSCA” by assigning full authority to one SCA. Each security administrator must first possess the appropriate administrative authority.