I agree. I can see this being added to the checklist for auditors. 

-----Original Message-----
From: IBM Mainframe Discussion List [mailto:[EMAIL PROTECTED] On Behalf Of Paul 
Gilmartin
Sent: Monday, May 05, 2008 9:51 AM
To: [email protected]
Subject: Re: allowuserkeycsa

On Mon, 5 May 2008 09:05:27 -0500, John P Kalinich wrote:
>
>Instead of an all inclusive ALLOWUSERKEYCSA=YES, why not something like
>ALLOWUSERKEYCSA=(program1,program2,...) for situations where there is no
>source code or support.
>
But the hazard is manifest not when an authorized program obtains
storage in a user key, but when an unauthorized program modifies
that storage.  Perhaps the solution would be to allocate user key
CSA only in a subpool that would be segment-protected from
modification by programs which are not APF authorized.

In the long term, integrity exposures must be covered; no
exceptions nor grandfather clauses.

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to