> On Friday, August 4, 2023 at 01:25:32 PM PDT, Wayne Bickerdike 
 > <[email protected]> wrote:

> The idea that a systems programmer of any type would be able to
> perpetrate fraud is a stretch.

A sysprog who can't perpetrate fraud is not a good sysprog. There is a huge 
difference between desire having the ability. Not having the time does not mean 
you couldn't have done so. 

> To implement this would require systems that implement application security. 

z/OS implements security in ways that are not apparent. There are obvious SAF 
calls implemented in CICS and IMS. There are many more that you never hear 
about built into most products. Think about all the SAF classes that can be 
activated. They are used somewhere. A security admin can secure every little 
thing but rarely has the will to do so. Not one security admin creates rules 
specific to each user. Not one security admin activates all security classes. 
Some take the view they are keeping honest people honest while others are very 
restrictive.

    On Friday, August 4, 2023 at 01:25:32 PM PDT, Wayne Bickerdike 
<[email protected]> wrote:  
 
 To implement this would require systems that implement application
security. The idea that a systems programmer of any type would be able to
perpetrate fraud is a stretch.

I had access to everything mainframe (RACF, CICS, z/OS) in a top secret
installation. I wouldn't be able to place a purchase order but I could nuke
any dataset. I was also too damn busy doing my job to compromise the
systems.

The worst case is where staff inherit privileges as they change roles. That
was a problem. Makes a case for role based security. Change roles > New
role based ID.

On Fri, Aug 4, 2023 at 11:34 PM Michael Babcock <[email protected]>
wrote:

> I ran across this in a CICS security admin book (which should also apply
> to z/OS sysprogs):
>
> Roles and separation of duties
>
>      A key security principle is the separation of duties between
> different users so that no one person has sufficient access privilege to
> perpetrate damaging fraud. *This configuration is required by various
> audit regulations such as the United States Federal Law known as the
> Sarbanes-Oxley Act of 2002
> <
> https://www.ibm.com/links?url=https%3A%2F%2Fwww.govinfo.gov%2Fcontent%2Fpkg%2FPLAW-107publ204%2Fpdf%2FPLAW-107publ204.pdf
> >.*
>
>      An example of this separation of duties, is that someone with the
> role of CICS System Programmer must not also have the role of RACF
> Security Administrator.
>
>
> Does anyone know exactly which section of SOX it's referring to?
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [email protected] with the message: INFO IBM-MAIN
>


-- 
Wayne V. Bickerdike

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN
  

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to