I made the original comment about the auditor and SVC.  At the time the
discussion sparked a memory of a SVC that was specifically used to gain
authorization and circumvent security (quite a while ago) that I had
encountered.  It was a great trick and pretty useful and very dangerous at
the same time (it had absolutely no controls on it).

I am very aware that there are all sorts of cool things that can be done and
that SVCs are a bit "yesterday's news".

I think that Auditors should be working with the Systems Programmers and
Security folks to achieve better controls and review what utilities are
available on the system and "scope" the usage.  However, usually the
relationship with the Auditors is combative and full of suspicion.  Instead
the combative/suspicious relationship leads to trying to give only the
minimum and thus forcing the Auditor to have to either "know the right
questions" or just rubber stamp it out of ignorance.  Of course the System
Programmer should be just as concerned if not more so about such things.
 After all they are the ones that will be "holding the bag of
responsibility" when a known hole or utility is used to the detriment of the
system.

There are a lot of very smart people out there and security is always a
problem.  The only truly secure system is one that sits in a corner
unplugged... not very useful.. but at least secure until someone shows up
with a truck.

It seems putting people to work together and achieving more layered (as in
an Onion and not a Parfait .. yes.. I know a Shrek reference)  and resilient
security/integrity would be a more desirable goal.  More of a consistent
model of incremental improvement being driven from multiple areas.

Even after an auditor comes and goes.. it is those responsible for the
various areas that have to live with which is usually trying to strike some
balance between control and productivity.

-- 
Rob Schramm
Senior Systems Engineer

w: 513.305.6224

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to