> -----Original Message----- > From: IBM Mainframe Discussion List > [mailto:[EMAIL PROTECTED] On Behalf Of Blaicher, Chris > Sent: Friday, May 20, 2005 9:51 AM > To: [email protected] > Subject: Re: "Leftover" data: can it be seen? > <snip> > > I am not a CICS expert, so memory in that environment is an > open question to > me, but I imagine you have some controls over what > transactions are put in a > CICS environment. >
Memory in CICS could indeed be a problem. But, as you stated, the programs authorized to run in a particular CICS region are specified by the CICS sysprog (well, unless program autoinstall is used). If a program deals with sensitive data and it is felt that the programming staff cannot be trusted <burr>, then that transaction and its programs really need to reside in a separate, highly secured, CICS region. Another possibility is to run with "Transaction Isolation". This, however, has horrible overhead. But it does protect transaction memory almost as well as running in separate address spaces. <snip> > > Chris Blaicher - personal opinions only -- John McKown Senior Systems Programmer UICI Insurance Center Information Technology This message (including any attachments) contains confidential information intended for a specific individual and purpose, and its' content is protected by law. If you are not the intended recipient, you should delete this message and are hereby notified that any disclosure, copying, or distribution of this transmission, or taking any action based on it, is strictly prohibited. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

