Miscellaneous

The following questions do not fall into any of the preceding categories; however, the information gained from the answers could be useful when conducting an audit.

  1. Can bypass label processing (BLP) be used? If yes, how is it controlled?
  2. Is OS password protection used? If yes, why?
  3. If dial-up terminals are used, how is unauthorized use prevented?
  4. Is full SMF recording in use? If not, what is excluded either by options or exit routine code?
  5. What is the wait limit that causes a terminal to be logged off?
  6. How far back do system backup dumps go?
  7. Are all IPLs logged and the reasons reported?
  8. Is all time on the system accounted for?
  9. Is it possible to detect if the system has been loaded without RACF®? You can use the DSMON reports to answer this particular question.
  10. How is the use of RACF commands controlled?