Responding primarily to Tony, I'll just say that when an adversary (internal or 
external) gains control over the PC that the privileged storage administrator 
uses, particularly when there's no true multi-factor authentication in the 
loop, then it's probably "game over."

—————
Timothy Sipples
Senior Architect
Digital Assets, Industry Solutions, and Cybersecurity
IBM zSystems/LinuxONE, Asia-Pacific
[email protected]


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to