Before you begin: You need to have set up a secure environment
for your system.
Perform the following steps to ensure that the system stays secure.
- Check each program that you want to introduce into the system.
Add a program only if you are certain that it will not lower the level
of security.
_______________________________________________________________
- For users of the system, set up rules for:
- Sharing data in files
- Specifying permission bits when creating files or using the chmod command
or chmod() callable service
_______________________________________________________________
- Require that users set the permission bits for their files to
deny access to all users except themselves, as the file owners.
_______________________________________________________________
- Protect all local data sets with a RACF® profile
that specifies UACC(NONE). Only administrators with responsibility
for creating, restoring, or dumping local data sets should be permitted
to this profile.
_______________________________________________________________
When you are done, you have taken steps to ensure that your system
stays secure.