All security parameters must be backed up in such a way that they can be installed in the backup computer as a whole, not as a special "patch" installation.
Pay special attention to the following points:
The correct implementation of the security authorizations needed by the Control‑M monitor (that is, defining the Control‑M monitor and its special authorization to the security package used in the backup computer).
All security parameters and definitions must be backed up and copied to the backup computer.
Third-party vendor exits relating to Control‑M (for example, RACF exit for R1.7 and R1.8—see the RACF Security Guide) must be copied, installed and checked in the backup computer, thus enabling a quick and correct implementation if the need arises.
Control‑M security exits, if used, must be checked and passed as a part of the disaster recovery plan.