Security This section outlines how you can protect IMS™ resources that can be accessed through FM/IMS functions.