Your post reminded me that I used to have to provide things like SETROPTS LIST output to auditors, produce SOX access reports, check RACF SMF records, and things like that. Because I worked a lot with id's, passwords, and even root access on Unix boxes, I always figured I would be the scapegoat if there was a mainframe data breach. So I used to joke about my picture ending up on TV news with my palms up in a kind of "I know nothing" pose :)

On 2/17/2021 9:10 PM, Wayne Bickerdike wrote:
The print command/PF*/Print sequence shows the physical screens and line
numbers start/end for each screen.

Save the ISPF.LIST dataset (KEEP NEW) and that should suffice.

Our external auditors ask for a RACF SETROPTS LIST, similar kind of request
and of course it could be fudged.

Currently trying to convince another team that z/OS has Unix and have
people who can SUDO (SU) and gasp that started tasks run as UID(0). They
usually start with "Well I understand Windows security, but? "


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to