W dniu 04.02.2022 o 00:12, Farley, Peter x23353 pisze:
I'll be the first to admit that I know just enough of what is in SYS1.PARMLIB 
to be dangerous, BUT . . .

What information could possibly be gleaned from reading PARMLIB that would 
require a knowledgeable auditor to insist on restricting read access (other 
than security by obscurity and sysprog/auditor job security)?

Just curious, I don't plan on hacking anything.

Official IBM documentations says the proper security setting for PARMLIB is READ.
This is good answer to any auditor.
(Exceptions like open-text passwords should be moved to separate dataset, but definitely avoided)

IBM's clarification: the information in PARMLIB is accessible to any non-privileged user via control blocks, CVT, etc.

My humble opinion: security by obscurity is no security. Educated hacked (or currently trendy "threat actor") will get relevant information without readind PARMLIB. Uneducated hacker... Stop! If you afraid of uneducated hackers then you quickly need to fix something.
My €0,02

--
Radoslaw Skorupka
Lodz, Poland

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to