Transaction, resource, command, and surrogate user security for intercommunication

The last step in defining security for your system is to make sure that the access parameters match the profiles you have defined for your transactions, resources, commands, and surrogate users for the link and the individual remote users. For information on defining these levels of security in a single-system environment, see Transaction security, Resource security, and CICS command security.

Resources and commands are unsecured unless you explicitly request security protection in your transaction definitions.