Charles Mills wrote: >The IBM program is AC=0 in an authorized library.
Weird, but can it do A? Is it so documented or supplied as AC=0? >I of course do not have the source for Y and so cannot inspect it for >potential integrity issues. Could you open a PMR and ask IBM? >I agree with you. While we can be relatively confident that Y does nothing >"bad" intentionally its authors presumably never intended it to run >authorized. IBM statement of integrity is looking good on paper, but can you trust it? >No, there does not appear to be a V2R1 manual called MVS Planning: Security. There is a redbook from ITSO which could help you? "Security on the IBM Mainframe: Volume 1 A Holistic Approach to Reduce Risk and Improve Security" (SG24-7803-01 - December 2014) HTH! Groete / Greetings Elardus Engelbrecht ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
