z/OS UNIX System Services Planning
Previous topic | Next topic | Contents | Contact z/OS | Library | PDF


Steps for maintaining the security level of the system

z/OS UNIX System Services Planning
GA32-0884-00

Before you begin: You need to have set up a secure environment for your system.

Perform the following steps to ensure that the system stays secure.

  1. Check each program that you want to introduce into the system. Add a program only if you are certain that it will not lower the level of security.

    _______________________________________________________________

  2. For users of the system, set up rules for:
    • Sharing data in files
    • Specifying permission bits when creating files or using the chmod command or chmod() callable service

    _______________________________________________________________

  3. Require that users set the permission bits for their files to deny access to all users except themselves, as the file owners.

    _______________________________________________________________

  4. Protect all local data sets with a RACF® profile that specifies UACC(NONE). Only administrators with responsibility for creating, restoring, or dumping local data sets should be permitted to this profile.

    _______________________________________________________________

When you are done, you have taken steps to ensure that your system stays secure.

Go to the previous page Go to the next page




Copyright IBM Corporation 1990, 2014