--------------------------------------------<snip>----------------------------------------

Rick,
Can you list the tool which need to be controlled at PROGRAM level?
I'm curious.

------------------------------------------<unsnip>------------------------------------
I was unaware that AMASPZAP called the SAF. I was thinking more of thinkgs like IEHPROGM.

I was once called upon to provide AMASPZAP to applications and database staffs. Since I had a source, I removed everything related to VTOC zapping and placed the modified version in a UN-authorized library. Everybody, including auditors, was happy with that solution.

--------------------------------------<snip>--------------------------------

Regarding AMASPZAP and Ed's mail:
The problem is not related to AMASPZAP. Completely! You mentioned that sysprog *copied* it to another APF library (or even the same, under new member name) - in this case PRGRAM protection no longer works! The security breach is an update to APF library, not lack of PROGRAM protection. AMASPZAP is powerful tool but all the functions are under SAF control.

----------------------------------------<unsnip>---------------------------------
Correct. Update access to APF libraries MUST be controlled and limited to trusted staff, with full auditing and review.

--
Rick
--
Remember that if you’re not the lead dog, the view never changes.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to