Now you have a basic understanding of the capabilities
of the read/write security features used by IBM® Rational® Change.
Before starting to define read/write security rules, review the CR
Process and lifecycles you are using.
The read/write security rules you define are implemented on top
of those rules. Be aware of what is already set up, and ensure that
those rules are functioning properly for you, before you add additional
restrictions.