Previous Topic: Program Origin Display

Next Topic: Identifying Program Products

Security Concerns

It is important to know what is in the z/OS system libraries. A library that is excessively large is the ideal place for someone to hide an unauthorized program. Also, if the data center staff does not know what is in its libraries, they cannot be sure that the program products that they delete from the system are really gone. It is possible for programmers to make copies of these programs. Copies of these programs could be hidden in a large library amid thousands of other programs. If you discover one of these product programs during a review, you should investigate it.

You can use the Program Origin Display (5.1) to select programs that you want to analyze based on program name or prefix, product name, or vendor name. Or you can ask for all the programs CA Auditor does not know about. They are probably locally written programs.