Planning for intercommunication security

Intercommunication security in a CICS® system is concerned with incoming requests for access to CICS resources, rather than with requests that are sent to other systems.

The security issue with incoming requests occurs when a particular user at a particular remote system is trying to access resources of your CICS system. Is this access authorized, or should it be rejected?

The following sections describe the points in the processing of an incoming request at which you can apply security checks.