× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



amen..
So, is there some doc or other "official" info to hand the average
CISSP or similar auditor to properly explain iSeries security.
An auditors or management overview.
Pictures & diagrams work well.
jim

----- Original Message ----- 
From: "Patrick Botz" <botz@xxxxxxxxxx>
To: "Midrange Systems Technical Discussion" <midrange-l@xxxxxxxxxxxx>
Sent: Monday, January 26, 2004 4:59 PM
Subject: Re: Losing Authority to a file in Batch


>
> And the point I was trying to make (and not very well) is that an audit
> company that has a "blanket policy" that adopted authority is bad/wrong,
> doesn't know enough to be doing your audits very well. Adopted authority
is
> not inherently bad. Used correctly, it provides more security...used
> incorrectly it can actually reduce the level of security. It's usage must
> be analyzed along with other factors such as who has authority to the
> program/command which adopts authority and what the program/command itself
> does.
>
> Patrick Botz
> Senior Technical Staff Member
> eServer Security Architect
> (507) 253-0917, T/L 553-0917
> email: botz@xxxxxxxxxx
>
>
> _______________________________________________
> This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
list
> To post a message email: MIDRANGE-L@xxxxxxxxxxxx
> To subscribe, unsubscribe, or change list options,
> visit: http://lists.midrange.com/mailman/listinfo/midrange-l
> or email: MIDRANGE-L-request@xxxxxxxxxxxx
> Before posting, please take a moment to review the archives
> at http://archive.midrange.com/midrange-l.
>
>



As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.