Planning workstation resource security

After planning resource security for printers and printer output, use this topic to begin planning workstation security.

On your Physical Security Plan, you listed workstations that represent a security risk because of their location. Use this information to determine which workstations you need to restrict.

You can encourage the people who use these workstations to be particularly aware of security. They should sign off whenever they leave their workstations. You may want to record your decision about sign off procedures for vulnerable workstations in your security policy. You can also limit which functions can be performed at those workstations to minimize the risks.

The easiest method for limiting function at a workstation is to restrict it to user profiles with limited function. You may choose to prevent people with security officer or service authority from signing on at every workstation. If you use the QLMTSECOFR system value to do this, people with security officer authority can sign on only at specifically authorized workstations.

Prepare the workstation portion of the Output queue and workstation security form. You should also review a list of resource security recommendations to ensure that your resource security plan is simple and complete. After you have reviewed the example and the recommendations you can begin planning your application installation.