On Sat, 9 May 2009 18:54:21 -0700, Ed Gould <[email protected]> wrote:


> Also if they do have access to amaspzap they can get around almost
anything, so I would still 
> restrict that access (along with its alias's).

That's not true, Ed.  Access to AMASPZAP only allows you to read or write
data that you already have access to by other means, *except* for the one
case of zapping a VTOC.  And for that, DASDVOL protection and/or operator
prompts supply the security.

But for the other cases, if you have UPDATE to a data set then you can zap
it, but of course if you have UPDATE to the data set you can write to it
with anything else, too.

That's why we're saying you need to protect the resources, not the utilities
that operate on them.  Someone can always find another utility, or write
their own (and it doesn't take much programming experience to write a REXX
exec, shell script, PERL script, PYTHON script, etc. to do it).

-- 
  Walt Farrell, CISSP
  IBM STSM, z/OS Security Design

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to