Steps for maintaining the security level of the system

Before you begin: You need to have set up a secure environment for your system.

Perform the following steps to ensure that the system stays secure.

  1. Check each program that you want to introduce into the system. Add a program only if you are certain that it will not lower the level of security.

    _______________________________________________________________

  2. For users of the system, set up rules for:
    • Sharing data in files
    • Specifying permission bits when creating files or using the chmod command or chmod() callable service

    _______________________________________________________________

  3. Require that users set the permission bits for their files to deny access to all users except themselves, as the file owners.

    _______________________________________________________________

  4. Protect all local data sets with a RACF® profile that specifies UACC(NONE). Only administrators with responsibility for creating, restoring, or dumping local data sets should be permitted to this profile.

    _______________________________________________________________

When you are done, you have taken steps to ensure that your system stays secure.