Many vendor packages provide varying levels of threat, usually permitting execution in privileged state, or dynamic subsystem or APF library manipulation.
Some packages that permit execution in privileged supervisor state, or allow security bypass include: CA‑IDMS, CA‑ASM2, CA‑LOOK™, RESOLVE, OMEGAMON, COMPLETE.
Controls include restricting program access and requesting superzaps from vendors to minimize or eliminate security breaches.
|
Copyright © 2010 CA Technologies.
All rights reserved.
|
|