BTS resources (processes, activities, and containers) are protected in the same way as resources accessed by CICS® file control commands. That is, resource-level security for a process, its activities, and their containers is based on the CICS file definition that specifies the repository data set to which records for processes of this type are written.
Users who run programs that define or acquire processes or activities of a particular process-type need UPDATE access to the corresponding CICS file.
Users who inquire on or browse processes or activities of a particular process-type need at least READ access to the corresponding CICS file.