R.S. wrote:

Rick Fochtman wrote:

-----------------------<snip>-----------------

From time to time I read on the list about companies which demand ISVs to provide source code for SVC routines to analyze it from security point of view. While I don't know to much about z/OS 'guts', I'm wondering what is the reason for that? Or rather, why the SVC code is so important, while APF-authorized libraries are not subject to analyze. The same apply to propgrams in SCHEDxx members. AFAIK (I could be wrong) APF-authorized program can bypass security rules, so it can be dangeours. Is SVC more dangerous ?


Last, but not least - neither SVC, nor 'regular' APF-authorized program can do anything illegal when not instructed, so unless ISV folks unlimited access to prod system it is like dangerous knife in my safe. Other possibility is that "backdoor" entry is disclosed by ISV to our sysprogs. In fact it owuld be a confession to security hole.


---------------------<unsnip>----------------------
My last shop processed enough money in a week to pay the U. S. National Debt, and NONE of that money was ours. We had to be like Caesar's wife, Calpurnia. That is, not only be pure, but perceived to be pure by all who beheld us. Security was held to be far more important than performance by "The Powers That Be".


IMHO it is completely irrelevant. Almost every z/OS installation process 'non-ours' money, usually much more than sysprog's salary. <what a pity!> So, all shops care about security, more or less.

Caution: I don't criticise SVC examination itself. I don't want to say it os good or it is bad. I just want to learn. My doubt is why SVC are so suspected while APF-authorized programs are not. It's common knowledge that sysprog+APF means bypass all security rules - isn't it ?

---------------------<unsnip>-----------------------
Roland, you're quite correct in one respect; APF pgms and SVC's can ALL be very dangerous. But most shops aren't quite as "intimately" involved in the banking industry and are thus not subject to quite the same levels of Federal oversite. Automated links to the Federal banking system are scrutinized to a degree that some folks would find incredible, and surprise audits by Federal agencies are an unfortunate fact of life. I was even subject to personal audits, just because of the nature of my position as a "highly trusted" employee. And personal bonding isn't just optional; it's REQUIRED; hence the comment about Caesar's wife. How many manufacturing organizations have the same levels of scrutiny? General Motors doesn't.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to