Previous Topic: User SVCsNext Topic: Tape Security


System Modifications

Obtain an inventory of the modifications to z/OS, JES, and vendor products, and understand what they do. The more modifications that are made to your system, the less integrity you can have. Also, include a verification of the system memory for evidence of dynamic modifications.

Note: CA Top Secret makes no external modifications that the system programmer can forget when CA Top Secret is re‑installed.