Obtain an inventory of the modifications to z/OS, JES, and vendor products, and understand what they do. The more modifications that are made to your system, the less integrity you can have. Also, include a verification of the system memory for evidence of dynamic modifications.
Note: CA Top Secret makes no external modifications that the system programmer can forget when CA Top Secret is re‑installed.
|
Copyright © 2010 CA Technologies.
All rights reserved.
|
|