The issue here is fallback. Not production run.

*| **Itschak Mugzach | Director | SecuriTeam Software **|** IronSphere
Platform* *|* *Information Security Continuous Monitoring for Z/OS, zLinux
and IBM I **|  *

*|* *Email**: [email protected] **|* *Mob**: +972 522 986404 **|*
*Skype**: ItschakMugzach **|* *Web**: www.Securiteam.co.il  **|*





On Wed, Mar 3, 2021 at 10:29 PM Jeremy Nicoll <[email protected]>
wrote:

> On Wed, 3 Mar 2021, at 20:22, Itschak Mugzach wrote:
>
> > I read the doc. It describes ACF2 coverage for UADS functionality. But
> what
> > happens if ACF2 refuses to start?
>
> Back out whatever you changed since it last worked?
>
> Even if you can get around the UADS issue, /surely/ you would not run a
> real system without ACF2 being active?
>
> I have some sort of recollection of ACF2 using WTORs to seek decisions
> on things, if it's not working - though presumably means some part of it
> (hooks?) are active.
>
> But if ACF2 isn't there to enforce all your security issues, I don't see
> how
> you can safely run a system at all.  How would you protect your datasets
> and other resources?
>
> --
> Jeremy Nicoll - my opinions are my own.
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [email protected] with the message: INFO IBM-MAIN
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to