Tony Harminc has made explicit a point that I made much too obliquely.

The chief uses of the NVD and that ilk is to ensure that the
operational software one has in current use includes fixes for the
vulnerabilities listed.

Note also that for the search argument 'z/OS' NVD output does include
at least one vulnerability of a CA product used under z/OS.

It is certain that other entities---government agencies, auditors, and
the like---will also require reassurance about these NIST
vulnerabilities and the state of a shop's operational software; and
for this reason I have recommended to clients that they prepare and
update weekly a standard report that provides this information.

This process can be automated in significant part, at least for
software that is maintained using SMP/E;  and having such a report and
the machinery for generating it in hand will save much time in the
future.   (It will also make sysprogs who anticipate this requirement
look.)

John Gilmore, Ashland, MA 01721 - USA

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to