On Thu, 7 May 2009 22:50:01 -0700, Ed Gould <[email protected]> wrote:

>I think I am going to disagree a little with you on this. Where the
disagreement comes in is where companies hand out APF libraries like candy.
>
>I actually had a programmer that was smart enough to copy amaspzap into an
authorized library and figure out where AMASPZAP was issuing the resource
(right term?calls to RACF) and essentially no-oping it and the same for the
place in amaspzap where it asks the operator to reply U and one or two other
places.
>
>Companies need to control APF libraries at all costs, IMO. In this case the
person could have called it something else and no one would have been any
wiser. They also need to go through the libraries every so often and delete
anything un-identifiable.

If I had UPDATE to an APF library there are lots of things I would do before
I'd bother making a copy of AMASPZAP.  UPDATE to an APF library effectively
gives you access to all data on the system, and lets you impersonate any
user you want to, whenever you want it.  At that point, why mess with AMASPZAP?

-- 
  Walt Farrell, CISSP
  IBM STSM, z/OS Security Design

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to