8.4. Opening the doors
Now that we have covered some physical and virtual security aspects, let's go to the next step in protecting a machine: allowing users entry.
When StoreCompany created its Linux-on-the-mainframe environment with Linux images and z/OS working together on one machine, one risk (arguably very small) it considered was that of a Linux image being taken over. What could then happen? The Linux image has a connection to z/OS, and someone could theoretically get access to z/OS resources. However, like most z/OS systems, StoreCompany's z/OS resources are under the control of the RACF security manager. It would not be possible to take over z/OS.
If someone very knowledgeable got as far as taking over a Linux image with a connection ...