|
From Al Macintyre V4R3 running BPCS 405 CD I think this sort of thing is far too common & it usually is not obvious that a software package is brain dead for host platform security until after the buying company has invested considerable in definitely going to that package. Some responsibility lies with the buying company ... their RFQ needs to have some minimal security demands such that they have the right to get all their money back if the package turns out to be one of the brain dead security ones. We need a Ralph Nader that will identify which vendor packages are brain dead in the computer security department, or some kind of IBM sponsored security rating of software. The right hand of IBM brags to high heaven about the great OS/400 security. The left hand of IBM is in marketing bed with software suppliers that demand that OS/400 security be totally trashed or they will not work. As to WHY software vendors do this sort of thing or do they UNDERSTAND? The #1 driving force, in my opinion, for software vendors is market demand. There is NO market demand at TIME OF SOFTWARE PURCHASE for competent computer security. By deliberately supplying software that is brain dead in areas that company purchasing is not smart enough to ask for, the software vendors guarantee a life time of extra money allegedly fixing such unnecessary problems. With respect to developers, I went direct to top management to complain about abuse of master security officer privileges. This software is supposed to work WITH SECURITY. If you want the developers to create software that only works if the user has security to access everything, let's just remove all security from our system right now & let anyone in the world do anything they please. This developer behavior makes security a farce. Well the very top management of the developers denied my accusation & wanted me to prove it ... within a few days I had the proof that developers were using master security to do their testing. My suspicion was that all the developers were using master security to do everything & that they did not understand user environments & the very notion of why a computer should have security of any kind. At the next meeting I was told that they needed ACCESS to master security to help trouble shoot problems ... we are paying a small fortune for the developers & do not want to hold them up due to a security problem. Fine, I agreed with that principle but disagreed with the notion that we should be providing deliverables that required that kind of access. The end result of many go arounds was that the developers STARTED doing what they SAID they had been doing all along ... only using Master Security for trouble shooting & fixing problems ... while I was in a bit of trouble for raising a stink about what management considered a non-problem, because management did not understand computer security internals ... but I had achieved my primary objectives, the developers were no longer providing software that required Master Security in the hands of end users to function. After the developers left, I disabled their sign-on because far too many co-workers knew their password, which had been passed around the project team ... the developers notion of fixing problems was to sign on as Master Security officer & ignore the problem. My notion was that occasionally someone might look at the documentation, and read the error message 2nd level. > From: mgraziano@badgermeter.com (Graziano, Marie) > I am currently working with a software vendor that is asking for the > userid > for the software to have ALLOBJ. Now we all know that this is a very very > bad move. However, in order to get the product up and running I had to do > it. What are other companies doing? And why do the software vendors not > understand what ALLOBJ is and does. IF the user id was not used to sign in, > then I would not have a problem, but the software signs in with the userid > each day. > > Marie Graziano Al Macintyre ©¿© MIS Manager Green Screen Programmer & Computer Janitor of BPCS 405 CD Rel-02 running on AS/400 V4R3 http://www.cen-elec.com Central Industries of Indiana--->Quality manufacturer of wire harnesses and electrical sub-assemblies +--- | This is the Midrange System Mailing List! | To submit a new message, send your mail to MIDRANGE-L@midrange.com. | To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com. | To unsubscribe from this list send email to MIDRANGE-L-UNSUB@midrange.com. | Questions should be directed to the list owner/operator: david@midrange.com +---
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.