Examples of security strategies

You can implement security in HCL Workload Automation for Z in many ways. Two extreme examples are shown below:
  • A centralized strategy in which all security functions are controlled at a central site using fixed resources
  • A decentralized strategy in which most security functions are delegated to users, and many subresources are defined.

Your security strategy probably falls somewhere between these two extremes.