-----------------------<snip>-----------------

The scenario you describe is quite possible. In shops where I've worked, getting caught doing something like that would result in a speedy promotion: to the street. And DON'T ASK FOR REFERENCES!

I know... But we are talking "security issues" here.

Maybe a disgruntled employee who is about to get a pink slip or about the send a resignation letter anyway.. doing those kind of actions could make considerable damage to the company if the timing is right - while someone succeeding into breaking into a critical account by brute force seems to me more unlikely. I am going on the premise that someone caught attempting to circumvent or abuse security measures is at risk *anyway* !

What I am hinting here is that account locking COULD (in certain situations) be a security *risk* rather than a security enhancement to a system - because although brute force cracking of account credentials is possible, abusing a userid lockout is far easier and accessible to implement (it doesn't even require any skill) !

And don't ask me about those 'secure' systems that ask you to change your password every 2 weeks - with passwords that must be at least 32 characters long, with no dictionary words, a mix of upper/lower/digits/special chars - which invariably get written on post-it(tm)s and "hidden" under the keyboard.

---------------------<unsnip>----------------------
You're still quite accurate. Here's what I did to avoid an extended outage: (Keep in mind that this was quite some years ago, before additional controls were implemented in RACF vis-a-vis started tasks):

1. I installed an exit which would allow all started tasks to run, whether they supplied valid passwords or not. The Systems Programming staff had complete control of Started Tasks, and any parmlibs that they might use.

2. I installed a Started Task that would RESUME selected userid's, with pre-determined passwords, based on parms provided in a tightly-controlled PARMLIB.

3. Access to the RACF DB, and its backups, was tightly controlled so that a brute-force approach, by unloading the RACF DB, wasn't possible outside the Security Administration staff (Me and one other System Programmer).

4. LOGON and Attempted LOGONs were audited, whether successful or not. A regular report of that information was generated, both for security admin staff and senior management. Information included was, among other items, USERID, number of attempts and TERMID (Thank you, VTAM).

5. If any DOS attempt was made for production userid's, the Operations staff had instructions to "Run this Started Task" and notify the ENTIRE security admin staff ASAP. We could then run some RYO reports to try and pinpoint the issue and/or offender.

IIRC, there's been a modification to RACF such that a started task will never be denied LOGON access; what happens after that depends on the various profiles in the RACF DB.

We had a job scheduling package in place and we used the propogation features for USERID and password, so NO production job contained either form of information. Another exit, for TSO SUBMIT, disallowed any USERID and/or password information to be submitted via TSO SUBMIT commands. A very few people were allowed to supply USERID information, via the SURROGATE mechanism of RACF. NOBODY was given SURROGATE authority for Started Tasks; even the security folks didn't have it. And STC & Production passwords were unknown. The job scheduler had SURROGATE access for the various production ID's, so providing a password was not needed.

Sooner or later, you'll have to invest a certain amount of trust in a selected, and trusted, few employees. If you can keep that to a minimum, you can minimize the risks of an extended outage because of "security abuse"; you just have to decide who you trust.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to