Charles Mills wrote:

>The IBM program is AC=0 in an authorized library. 

Weird, but can it do A? Is it so documented or supplied as AC=0?


>I of course do not have the source for Y and so cannot inspect it for 
>potential integrity issues.

Could you open a PMR and ask IBM?


>I agree with you. While we can be relatively confident that Y does nothing 
>"bad" intentionally its authors presumably never intended it to run 
>authorized. 

IBM statement of integrity is looking good on paper, but can you trust it?


>No, there does not appear to be a V2R1 manual called MVS Planning: Security.

There is a redbook from ITSO which could help you?

"Security on the IBM Mainframe: Volume 1 A Holistic Approach to Reduce Risk and 
Improve Security"

(SG24-7803-01 - December 2014)

HTH!

Groete / Greetings
Elardus Engelbrecht

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to