z/OS utilities use standard z/OS mechanisms to access data, and therefore go through normal security validation. However, some utilities or utility functions do not go through security processing. For example:
This utility can determine if APF‑authorized can change any data anywhere including security indicators.
This utility can allow certain functions to bypass security.
This utility can initialize any tape volume (overwrite header labels) with only operator authorization.
Utilities can automatically invoke the Standard Security Interface directly themselves or indirectly using OPEN. Therefore, CA Top Secret is automatically invoked.
Utilities that do not interface with security should:
|
Copyright © 2010 CA Technologies.
All rights reserved.
|
|