Responding primarily to Tony, I'll just say that when an adversary (internal or external) gains control over the PC that the privileged storage administrator uses, particularly when there's no true multi-factor authentication in the loop, then it's probably "game over."
————— Timothy Sipples Senior Architect Digital Assets, Industry Solutions, and Cybersecurity IBM zSystems/LinuxONE, Asia-Pacific [email protected] ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
