On Mon, 5 Apr 2010 15:43:18 -0500 Martin Kline <[email protected]> wrote:

:>>You do not give them access to the target or distribution libraries.

:>>That would prevent APPLY/ACCEPT.

:>But you would give the same people update access to the PTS and CSI? 
:>Wouldn't that just make it possible for a determined person to create or 
:>modify a PTF so that the authorized person can implement it for them? 

:>For example, it would be fairly simple for a trained person to modify SMP 
input 
:>for a HIPER PTF to add JCLIN and a new CSECT that replaces almost any SVC 
:>on the system. They receive it to the PTS, the systems programmer installs 
:>the modified PTF, and unknowingly implements whatever security hole the 
:>originator wants. 

If he has access to the PTS or the RELFILEs he can do that already.

Explain how granular access to SMP adds to security of the above datasets.

:>For me, the SMP libraries are at most read only for anyone except the systems 
:>programmers. 

Agree.

--
Binyamin Dissen <[email protected]>
http://www.dissensoftware.com

Director, Dissen Software, Bar & Grill - Israel


Should you use the mailblocks package and expect a response from me,
you should preauthorize the dissensoftware.com domain.

I very rarely bother responding to challenge/response systems,
especially those from irresponsible companies.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to