Change request process and lifecycle security review

Now you have a basic understanding of the capabilities of the read/write security features used by IBM® Rational® Change. Before starting to define read/write security rules, review the CR Process and lifecycles you are using.

The read/write security rules you define are implemented on top of those rules. Be aware of what is already set up, and ensure that those rules are functioning properly for you, before you add additional restrictions.


Feedback