This video describes what DBRC commands and other resources can be secured, the environments and other interfaces to RECON data sets that can be secured, how the choices of security mechanisms, SAF/RACF and the Command Security Exit can be specified and how they interact with each other, and some of the factors that might result in unexpected results when aggregations of RECON resources are secured with SAF/RACF.