Think like a security admin instead of programmer. You are right that dynalloc 
is not a problem but to a security admin, it is an exposure. Exposures combine 
to become a problem.  Here are some examples (UNRELATED to dynalloc) that may 
help to clarify.
1. Don't you have customers that refuse to send in dumps? Thankfully most 
customers are willing but technically they are an exposure.2. Can an outsider 
(without userid / password and no anonymous) use FTP to access files? In the 
Target breach, they successfully found userid's and passwords.3. Securid cards 
are strong password validation compared to simple passwords yet they still 
aren't a standard practice.4. Are strong SAF dataset rules sufficient to 
protect data? Of course not. Several of the SAF classes exist because dataset 
rules are not enough. 5. Can a great security admin fully protect a system? No. 
It's always about compromise and balance. In general, it works out well but it 
still has exposures. 
> If a user can access data, the data should be considered exposed

Exactly. As a security administrator, this is the compromise. For whatever 
reason, it's worth the risk and we try to find alternative methods to reduce 
that risk. 
Jon.
    On Sunday, December 24, 2017 5:59 AM, Peter Relson <[email protected]> 
wrote:
 
 The argument that dynalloc is the problem strikes me as somewhat dubious.
It was suggested that you need to restrict dynalloc because an allocated 
data set is a way to capture data that the user is already authorized to 
access.

That is not the "problem" statement; a data set might contribute to the 
possible bandwidth of an attack but it does not make the attack possible.
If a user can access data, they can extract it in many ways (including 
writing it on a piece of paper).
If a user can access data, the data should be considered exposed, to the 
extent that you do not trust the user.

Peter Relson
z/OS Core Technology Design

   

Reply via email to