Charles,

A big thanks sir..
Scott

On Sun, Dec 3, 2017 at 12:25 PM, Charles Mills <charl...@mcn.org> wrote:

> https://en.wikipedia.org/wiki/Trusted_Computer_System_
> Evaluation_Criteria#B_–_Mandatory_protection
>
> Charles
>
>
> -----Original Message-----
> From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On
> Behalf Of scott Ford
> Sent: Sunday, December 3, 2017 8:31 AM
> To: IBM-MAIN@LISTSERV.UA.EDU
> Subject: Re: Passing data from step-to-step in single job using memory??
>
> I don't think we or IBM should be close minded to passing job step data in
> memory.
> I agree with Peter , we deal with security all the time. I haven't heard
> of B1, Peter could you share a link? I don't want leave any system open to
> hacking or whatever the current buzzword is in our vocabulary. But I also
> see a level of ignorance and over-reaction , because of a perceived .
>
> Scott
>
> On Dec 3, 2017, 11:20 AM -0500, J R <jayare...@hotmail.com>, wrote:
> > "z/OS Unix" as opposed to "Normal MVS"
> >
> > I like that clarification!
> >
> > > On Dec 3, 2017, at 10:20, Peter Relson <rel...@us.ibm.com> wrote:
> > >
> > > Given that an unauthorized user has access only to unauthorized
> > > subpools and that all unauthorized subpools are freed between steps,
> > > some less direct approach would be necessary, involving authorized
> > > code putting the data into some other kind of storage (be that an
> > > authorized subpool, common storage, shared storage, etc) and
> > > providing some means by which the new step could access that.
> > > Perhaps z/OS Unix does so. "Normal" MVS would likely never do that
> > > as it could be considered a violation of B1 security (to the extent
> > > that anyone still cares about B1 security), at least for the case
> > > where the subsequent step might be started in a different address
> space, such as in a restart scenario.
> > >
> > > Peter Relson
> > > z/OS Core Technology Design
> > >
> > >
> > > --------------------------------------------------------------------
> > > -- For IBM-MAIN subscribe / signoff / archive access instructions,
> > > send email to lists...@listserv.ua.edu with the message: INFO
> > > IBM-MAIN
> >
> > ----------------------------------------------------------------------
> > For IBM-MAIN subscribe / signoff / archive access instructions, send
> > email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions, send email
> to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>



-- 



*IDMWORKS *

Scott Ford

z/OS Dev.




“By elevating a friend or Collegue you elevate yourself, by demeaning a
friend or collegue you demean yourself”



www.idmworks.com

scott.f...@idmworks.com

Blog: www.idmworks.com/blog





*The information contained in this email message and any attachment may be
privileged, confidential, proprietary or otherwise protected from
disclosure. If the reader of this message is not the intended recipient,
you are hereby notified that any dissemination, distribution, copying or
use of this message and any attachment is strictly prohibited. If you have
received this message in error, please notify us immediately by replying to
the message and permanently delete it from your computer and destroy any
printout thereof.*

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to