Miscellaneous
The following questions do not fall into any of the preceding categories; however, the information gained from the answers could be useful when conducting an audit.
- Can bypass label processing (BLP) be used? If yes, how is it controlled?
- Is OS password protection used? If yes, why?
- If dial-up terminals are used, how is unauthorized use prevented?
- Is full SMF recording in use? If not, what is excluded either by options or exit routine code?
- What is the wait limit that causes a terminal to be logged off?
- How far back do system backup dumps go?
- Are all IPLs logged and the reasons reported?
- Is all time on the system accounted for?
- Is it possible to detect if the system has been loaded without RACF®? You can use the DSMON reports to answer this particular question.
- How is the use of RACF commands controlled?