This topic describes resource security, which ensure that users that attempt to use CICS® resources are entitled to do so.