On 2015-08-26 10:20, R.S. wrote:
> 
> My thoughts:
> 1. Don't allow unauthorized persons to change dataset. Use RACF.
> 2. To check who and when changed the dataset ...use RACF. AUDIT(ALL(READ)).
> 3. If you cannot rely on RACF & SMF then you also cannot rely on hash 
> information - it can be modified as well.
> 
Mostly.  Suppose the data set has been allocated, opened for update, read,
closed, and freed but never written to, or even overwritten with identical
content.  Kirk might want to consider this unchanged.  Can this be
discerned from SMF data?

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to