> -----Original Message-----
> From: IBM Mainframe Discussion List 
> [mailto:[EMAIL PROTECTED] On Behalf Of Blaicher, Chris
> Sent: Friday, May 20, 2005 9:51 AM
> To: [email protected]
> Subject: Re: "Leftover" data: can it be seen?
> 
<snip>
> 
> I am not a CICS expert, so memory in that environment is an 
> open question to
> me, but I imagine you have some controls over what 
> transactions are put in a
> CICS environment.  
> 

Memory in CICS could indeed be a problem. But, as you stated, the
programs authorized to run in a particular CICS region are specified by
the CICS sysprog (well, unless program autoinstall is used). If a
program deals with sensitive data and it is felt that the programming
staff cannot be trusted <burr>, then that transaction and its programs
really need to reside in a separate, highly secured, CICS region.

Another possibility is to run with "Transaction Isolation". This,
however, has horrible overhead. But it does protect transaction memory
almost as well as running in separate address spaces.

<snip>

> 
> Chris Blaicher - personal opinions only


--
John McKown
Senior Systems Programmer
UICI Insurance Center
Information Technology

This message (including any attachments) contains confidential
information intended for a specific individual and purpose, and its'
content is protected by law.  If you are not the intended recipient, you
should delete this message and are hereby notified that any disclosure,
copying, or distribution of this transmission, or taking any action
based on it, is strictly prohibited.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to