Previous Topic: CA Top Secret Installation ExitNext Topic: Subversion


Tampering

CA Top Secret periodically (every 30 seconds by default) checks the integrity of critical tables and actual machine instructions in its own programs. If detected during the period in which these critical areas remain altered, non-deletable messages appear on the O/S master console.

CA Top Secret tables and Security Records are found primarily in Key 3 storage; minimizing accidental storage overlays.

Tampering includes changing the code in the system program and CA Top Secret exits and dynamically adding user SVCs. To succeed at tampering, a programmer (or user) must be in privileged state or have made physical alterations using the system console (alter/display frame). Operations must be allowed to exercise some control over threatening situations.

Operations have an ACID with CONSOLE authority to enable them to issue CA Top Secret control options using the O/S MODIFY command for the following situations: