On 20/08/2023 8:53 pm, Mike Cairns wrote:
I worked at one site many years ago where the local specialist had actually 
tested across multiple IPL's the necessity for each and every one of these 
tasks to actually have the TRUSTED attribute and the conclusion was that many 
of these did not actually need to be TRUSTED and could manage perfectly fine 
using normal RACF access to resources granted via permissions to profiles.

I worked at a site which did a similar exercise. The risk is:

1) If the doc says it should be trusted, IBM are free to add functions that require access to other resources without documentating them. It's possible that IBM don't even consider what access would normally be required for an address space they specify as TRUSTED, or test it without TRUSTED.

2) There may be functions that are invoked only in unusual circumstances, so you only find out that access is missing when you are already dealing with a problem.

Not worth the risk, in my view (our security group disagreed!)

--
Andrew Rowley
Black Hill Software

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to