On Tue, 26 Feb 2008 19:53:42 -0600, David Eisenberg
<[EMAIL PROTECTED]> wrote:

>Not in this case, IMO.
>
>The violations are occurring as a result of a text string scan across all
>members of a production source code library in CA's Panvalet format. The
>library contains hundreds of members, but a handful of them have
>UACC=NONE. Here's how: Panvalet supports *member-level* security. We
>create RACF "pseudo-profiles" that contain the member name as the last
>qualifier, and if we wish to read-protect a member, we set that profile to have
>UACC=NONE. A Panvalet security exit constructs the pseudo-profile name, and
>invokes RACROUTE to see if read access to the member is permitted or not.

I would agree that's a reasonable case for using LOG=NONE.  It will,
however, require you to run APF-authorized, and I think it's appropriate to
require APF in this case.

-- 
  Walt Farrell, CISSP
  IBM STSM, z/OS Security Design

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to