> I run a zPDT and on there is a utility (i.e. a Linux command ACPTOOL) to 
> allow the changing of some Control Points without a TKE.....

As has been stated multiple times in the zPDT documentation (RedBooks and 
BlueBook) and on the zPDT forum: zPDT is not intended as a secure system for 
many reasons. There are no plans to change this on an emulated system!!

There is an intent to have most of the ICSF commands/macros (and actual 
hardware instructions) "work" to provide program development and testing, but 
that is a different intent than providing a "real" secure system.  (And one 
specific recommendation has been repeated: DO NOT USE THE SAME MASTER KEYS ON 
zPDT THAT ARE USED ON A REAL SYSTEM.)

It seems to me (being old and a little stupid) that there are several levels to 
this discussion:

  1.
Those having almost no interest in security much beyond simple userids and some 
basic dataset protections. Many zPDT users, or perhaps real system/LPAR users 
who are sufficiently isolated by other means are in this group. This might 
include a potentially larger group of "newcomers" to mainframes!!
  2.
Those who would like to go through the motions (without digging too far into 
the details) to implement some basic security, mostly to protect against 
"accidental" errors/problems/trials/experimentation/etc. This level would 
probably involve some routine basic/simple maintenance such as normal RACF 
commands, etc, etc, etc.
  3.
Those who really need much fuller security and are willing to dig into many 
details. These might be installations that process $$billions$$ daily, etc, 
etc, etc, and need to immediately consider quantum-safe details, etc, etc. Or 
those who are developing software products to work in this environment.
  4.
Those dealing with other security natures (such as national Top Secret, etc, 
etc) and need to incorporate their systems into the appropriate 
level/compartment/etc.  (The IBM-MAIN discussions do not generally involve such 
systems, so I will ignore them here!)

In the good-old-days, when I was a little younger, there were often smaller 
RedBooks that dealt with practical usage of various areas of IBM systems. In a 
sense, this material was mostly written by actual users (customers, IBMers) of 
the products being addressed and often touched multiple IBM 
products/commands/components that were involved in practical operations. These 
were sometimes seen as "hands on" books. (Of course, since today few companies 
provide real "paper" books, there are additional considerations .....)

My $.02 worth, if it is worth that much!

Bill Ogden

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to