Steps for maintaining the security level of the system
Before you begin: You need to have set up a secure environment for your system.
Perform the following steps to ensure that the system stays secure.
- Check each program that you want to introduce into the system.
Add a program only if you are certain that it will not lower the level
of security.
_______________________________________________________________
- For users of the system, set up rules for:
- Sharing data in files
- Specifying permission bits when creating files or using the chmod command or chmod() callable service
_______________________________________________________________
- Require that users set the permission bits for their files to
deny access to all users except themselves, as the file owners.
_______________________________________________________________
- Protect all local data sets with a RACF® profile
that specifies UACC(NONE). Only administrators with responsibility
for creating, restoring, or dumping local data sets should be permitted
to this profile.
_______________________________________________________________
When you are done, you have taken steps to ensure that your system stays secure.