On Tue, 6 Apr 2010 13:28:11 +0200, R.S. <[email protected]> wrote:

>Of course in every case we should know the meaning of the profiles and I
>believe that the GIM.** profiles will be documented. It does not
>contradict with the APAR statement - the risk details can be still obscured.
>BTW: I bet the case is very bizarre case and it does not affect majority
>of us, BUT the APAR officially falls into category "integrity" and gets
>all the attributes of secrecy. I consider it as SPE (Small Programming
>Enhancement) with disputable qualification.

Sorry, Radoslaw, but while the implementation may have happened to provide a
functional enhancement that some of you will find useful, we would not have
released an APAR that -requires- those migration actions if it were merely
an enhancement.  

We might have introduced such improved function via an APAR, but it would
have been optional (e.g., "if you want to control function x you can define
this profile", not "if you want to allow the program to continue working at
all you must define a profile").  We do not lightly make such changes
mandatory and force migration actions on our users in the service stream.

There is a legitimate integrity exposure involved, and the APAR is properly
classified as such.  We perhaps should have said a bit more in the
documentation.  We're considering whether we can do so, and what we can say
that will convey the magnitude of our concern (though merely the fact that
we did this via an APAR with mandatory migration actions should serve as a
indication  that we have serious concerns and there is a legitimate problem
to address).

-- 
Walt Farrell, CISSP
IBM STSM, z/OS Security Design

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to