authenticating users entering the CICS region 2. **Transaction Security** — controlling who can execute which transactions 3. **Resource-Level Security** — controlling who can access specific resources (files, queues, programs) 4. **Command Security** — controlling who can issue CICS system programm