Use the File Integrity Analysis functions (6.1) to detect structural problems. For library analysis, you must have read access authority to the library that you want to analyze. The other functions only require VTOC access.
Auditor___________________________ Location___________________ Page____of____
Approved__________________________ CPU________________________ Date__________
|
Step |
Description |
W/P Ref |
Finding |
Remarks |
|---|---|---|---|---|
|
1 |
Validate the entire password system using the Password Integrity Analysis display (6.1.1). See the Usage Guide for more information about integrity analysis before you conduct your review. |
|
|
|
|
2 |
Note any files that are marked as password protected but do not have corresponding protection characteristics record in the PASSWORD file. Use the Password Integrity Analysis display (6.1.1). |
|
|
|
|
3 |
Determine if the password protection bit was zapped of any file using the Password Integrity Analysis display (6.1.1). If this occurred, an entry in the PASSWORD file exists but the corresponding bits are not set in the file’s VTOC. |
|
|
|
|
4 |
If the PASSWORD file analysis performed in Steps 1 through 3 determined that no PASSWORD file exists, verify that no files were found marked as password‑protected. |
|
|
|
|
5 |
Determine the names of the critical system libraries using the Key z/OS Libraries display (2.4). To look at data sets within the logical Parmlib, use the Parmlib Show Datasets display (2.1.3). To test each library, use the Library Integrity Analysis display (6.1.2). Note any load errors that are detected in these libraries. |
|
|
|
|
6 |
Select a sample of disk volumes using the Find Hardware Information display (1.2). Analyze each of these volumes to identify structural problems using the Disk Volume Analysis display (6.1.3). |
|
|
|
| Copyright © 2009 CA. All rights reserved. | Tell Technical Publications how we can improve this information |