Security This section outlines how you can protect IMS™ resources that can be accessed through ZDT/IMS functions.