CA Top Secret periodically (every 30 seconds by default) checks the integrity of critical tables and actual machine instructions in its own programs. If detected during the period in which these critical areas remain altered, non-deletable messages appear on the O/S master console.
CA Top Secret tables and Security Records are found primarily in Key 3 storage; minimizing accidental storage overlays.
Tampering includes changing the code in the system program and CA Top Secret exits and dynamically adding user SVCs. To succeed at tampering, a programmer (or user) must be in privileged state or have made physical alterations using the system console (alter/display frame). Operations must be allowed to exercise some control over threatening situations.
Operations have an ACID with CONSOLE authority to enable them to issue CA Top Secret control options using the O/S MODIFY command for the following situations:
F TSS,FACILITY(fac=INACTIVE)
The facility (such as TSO) is deactivated preventing access by all ACIDs except the MSCA.
F TSS,FACILITY(fac=AUDIT)
All activity by users of a given facility is audited.
|
Copyright © 2010 CA Technologies.
All rights reserved.
|
|