Your installation can have user‑written SVCs for special functions. Examine the SVC table for authorized SVCs. User‑written SVCs can be an opportunity to defeat security. An SVC can potentially change the privileges of its caller and thus open up a possible security bypass. An audit must verify these user-written SVCs by looking at the nucleus memory for dynamic changes to the operating system after IPL.
|
Copyright © 2010 CA Technologies.
All rights reserved.
|
|