Plugging the Holes: Finding Security Issues in ACF2, RACF and Top Secret Configurations
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
2013 ,
SHARE in San Francisco 2013
This session will walk through the Top 10 common z/OS security definition concerns that exist on many systems with the goal of plugging these holes at your shop. We will pursue each concept, and then will show you how to identify the problem on each of CA ACF2, IBM RACF and CA Top Secret. We will end with a summary command list for each that may be used for a partially automated configuration management review. Bill Valyo ; CA Technologies & Phil L. Emrich ; Vanguard Integrity Professionals
Back to Proceedings File Library