Walt Farrell wrote:

>The key point is that the DFDSS enforces security, and the ADMINISTRATOR 
>keyword usage must be controlled, because it's purpose is to bypass certain 
>other security checks. 

I certainly know it. I just took this example to illustrate my point. I could 
use other examples if I wish.

>There is no security processing in DFSORT, and therefore there is no reason to 
>protect any of its processing. Anyone who can read a file can always produce a 
>modified copy of it, whether that's by using DFSORT, IEBGENER, a homegrown 
>COBOL application, or even a simpe REXX exec or CLIST.

Agreed. As long you can convince the auditors you can reproduce the reports 
100% faithfully from original data source.

Groete / Greetings
Elardus Engelbrecht

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to