I have been tasked with documenting 'best practice' for configuring z/OS for security.
This does not include RACF (or other ESM) practices. The scope is limited to what I can do in configuring z/OS to ensure no one can bypass RACF/ESM. What I can think of offhand is keeping tight control of LPALIST, LINKLIST, APFLIST, SCHEDxx/PPT Does anyone know of a book/paper/guide/reference that would outline a 'best practice' for z/OS security configuration. I've been searching this list, redbooks, Google, but not finding much that isn't RACF/ESM specific. TIA Ken Ken Porowski VP Mainframe Engineering CIT Information Technology +1 973 740 5459 (tel) One CIT Drive Livingston, NJ 07039 [email protected] www.cit.com This email message and any accompanying materials may contain proprietary, privileged and confidential information of CIT Group Inc. or its subsidiaries or affiliates (collectively, "CIT"), and are intended solely for the recipient(s) named above. If you are not the intended recipient of this communication, any use, disclosure, printing, copying or distribution, or reliance on the contents, of this communication is strictly prohibited. CIT disclaims any liability for the review, retransmission, dissemination or other use of, or the taking of any action in reliance upon, this communication by persons other than the intended recipient(s). If you have received this communication in error, please reply to the sender advising of the error in transmission, and immediately delete and destroy the communication and any accompanying materials. To the extent permitted by applicable law, CIT and others may inspect, review, monitor, analyze, copy, record and retain any communications sent from or received at this email address. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
