The QUERY SECURITY command

In addition to using CICS® security checking for CICS-controlled resources (or as an alternative to it), you can use the QUERY SECURITY command to control security access within the CICS application. This method also allows you to define security profiles to RACF® for resources other than CICS resource profiles, and enables a more detailed level of security checking than is available through the standard resource classes.

See RACF general resource profiles for information about the resource classes that RACF supports for resource security checking within transactions. For more information about resource security checking, see Resource security.