Allowing a developer to have command line access to production applications and data just makes your job as a Security Administrator that much harder. Now you do have to worry about what a developer can do that they shouldn't be doing.
If you give developers command line access to production applications, you are providing a way for an untrustworthy developer to play around with your production security configuration and if they are lucky or devious enough they just may figure out a way to hack it. Play it safe… exclude developer User ID's from production access.
Dig Deeper on iSeries system and application security
Related Q&A from Ken Graap
The BRMS Network feature allows a BRMS system to connect to other BRMS systems via a network, and enables a user to consolidate media such as backup ... Continue Reading
The only option to correct damage preventing file journaling is to use the RCLSTG command. Continue Reading
IBM's iSeries Backup and Recovery manual answers many questions related to system backup and disaster recovery. Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.