SlideShare a Scribd company logo
1 of 55
All trademarks and registered trademarks are the property of their respective owners.© HelpSystems LLC. All rights reserved.
IFS Security—Don’t Leave
Your Server Vulerable
HelpSystems Corporate Overview. All rights reserved.
Robin Tatam, CISM CBCA PCI-P
Global Director of Security
Technologies, HelpSystems
+1 952-563-2768
robin.tatam@helpsystems.com
Today’s Speaker
HelpSystems Corporate Overview. All rights reserved.
• Expansive Multi-Platform Software Portfolio
• Comprehensive Professional Services
• World-Class Security Experts:
– Robin Tatam, CISM CBCA PCI-P
– Carol Woodbury, CRISC
• Member of PCI Security Standards Council
• Authorized by NASBA to Issue CPE Credits for Security Education
• Publisher of the Annual “State of IBM i Security” Report
About the HelpSystems Security Investment
HelpSystems Corporate Overview. All rights reserved.
What Is the Mysterious IFS?
HelpSystems Corporate Overview. All rights reserved.
According to Wikipedia, it can be many things to
many people:
What Is the Mysterious IFS?
• Independent Front Suspension
• Indian Fertility Society
• Initial Flight Screening
• Initiative on Financial Security
• Institute for Fiscal Studies
• Insurance and Financial
Services
• Intensive Freshman Seminar
• International Financial Statistics
• International Food Standard
• Integrated Forecast System
HelpSystems Corporate Overview. All rights reserved.
Integrated File System
Integrated File System — on IBM midrange & mainframe systems
(e.g. OS/400, MVS, VM/CMS), the POSIX compatible file system
provided by the operating system, as opposed to the traditional non-
POSIX file system it also supplies.
What Is the Mysterious IFS?
HelpSystems Corporate Overview. All rights reserved.
• Added to OS/400 in V3R1 in 1994
• Integrates IBM i with UNIX, Windows, and others
• Directory structure much like a PC
• Provides access to data stored on integrated servers,
or on other remote IBM i servers
• Contains several pre-defined file systems:
– All contained within a single root directory
– Each with their own limitations and rules
What Is the Mysterious IFS?
HelpSystems Corporate Overview. All rights reserved.
Contrary to popular belief, it was not an add-on to the existing file
structures, but rather encompasses ALL of the file structures. This
includes those that pre-date the IFS such as:
Native Libraries QSYS.LIB
Documents and Folders QDLS
What Is the Mysterious IFS?
HelpSystems Corporate Overview. All rights reserved.
We ALL technically use the IFS as it encompasses QSYS.LIB
Some other common uses of the IFS include:
• Integrated PC servers (Intel processor)
• NetServer (Explorer access to the IFS)
• CD images for unattended installation
• PASE environment for UNIX applications
• IBM i Access (Client Access) & Navigator executables
• Apache HTTP server
• Tomcat application server
• WebSphere application server
• Lotus Domino
• Digital Certificate Manager
“I’m Not Even Using the ISF, I mean IFS!”
HelpSystems Corporate Overview. All rights reserved.
IBM i ships with its public access default to the IFS set to:
Native objects = *CHANGE
IFS root folder = *RWX plus all object authorities (aka *ALL)
TIP: This should be changed ASAP!
It’s Already Secure, Right?!”
HelpSystems Corporate Overview. All rights reserved.
Organizations often place tremendous trust in the people accessing
their servers.
Authorized users usually have privileges far in excess of any
business requirement.
“But Bill Has Worked Here for xx Years!” (insert big number)
HelpSystems Corporate Overview. All rights reserved.
According to the “State of IBM i Security Study,” most organizations
still base their security on lack of user knowledge or malicious intent.
• Average of 147 users with *ALLOBJ special authority
• Average of 76 enabled profiles with default passwords
“But Bill Has Worked Here for xx Years!” (insert big number)
HelpSystems Corporate Overview. All rights reserved.
But How Well Do We REALLY Know Him?
Lots of people have skeletons in
their closet!
The cold reality of an economic
downturn may cause (normally)
trustworthy users to act out of
desperation.
And there are vices like gambling and
drugs that often influence ethics.
And, of course, anyone can make a
legitimate mistake!
HelpSystems Corporate Overview. All rights reserved.
IBM i vs. Unix vs. PC
HelpSystems Corporate Overview. All rights reserved.
In IBM i, every object has data authorities and object authorities.
Data authorities consist of: Read, Add, Update, Delete, and Execute
Object Authorities consist of: Opr, Mgt, Exist, Alter, and Ref
IBM i authorities (data and object) are typically assigned using one of
four IBM-supplied templates:
*USE, *CHANGE, *ALL, and *EXCLUDE
Object Authority vs. Data Authority
HelpSystems Corporate Overview. All rights reserved.
Data Authorities
– *READ - Required to read the object
– *ADD, *UPD, *DLT — Required to change the object
– *EXECUTE — Required to run a program or find an object
Object Authorities
– *OBJOPR — Required to operate on data (set if there are any data authorities)
– *OBJMGT — Required to move, rename, or work with permissions
– *OBJEXIST — Required to delete, save, and restore the object
– *OBJALTER — Database authority
– *OBJREF — Database authority
IBM-Supplied Templates
– *EXCLUDE — Specifically denies access to the object
– *USE — *OBJOPR and *READ and *EXECUTE
– *CHANGE — *OBJOPR and all data authorities
– *ALL — All data and object authorities
IBM i Authorities
HelpSystems Corporate Overview. All rights reserved.
IFS
Security
IBM i
Authorities
The IFS security model is a unique combination of IBM i authorities,
PC file properties, and Unix file permissions.
IBM i Authorities
HelpSystems Corporate Overview. All rights reserved.
For IFS objects,‘ObjOpr’ (Object Operational) authority is
considered a data authority and NOT an object authority.
Object Authority vs. Data Authority
HelpSystems Corporate Overview. All rights reserved.
In Unix terminology, we secure files and directories using a
combination of Read (*R), Write (*W), and Execute (*X) permissions.
As with *USE, *RX provides Read and Execute
data authority and no object authorities (except
‘Opr’ as noted on the prior slide).
As with *CHANGE, *RWX provides all data
authorities and no object authorities
(except ‘Opr’ as noted on the prior slide).
*CHANGE
*USE
Unix Permissions
There’s no
Unix equivalent
of *ALL
HelpSystems Corporate Overview. All rights reserved.
PC Properties
PC properties, such as “read-only,” are another layer of protection
against object abuse. Even *ALLOBJ users are unable to delete a file
marked as read-only.
Other file properties include:
• Need to archive (PC and system)
• Hidden file
• PC system file
HelpSystems Corporate Overview. All rights reserved.
PC properties can be viewed and altered using:
• IBM i’s CHGATR command
• Navigator for i properties
• Windows Explorer Properties
(NetServer)
• DOS “attrib” commands
PC Properties
HelpSystems Corporate Overview. All rights reserved.
IBM i supports a check out/check in capability that restricts certain
functions to the user who has checked out the file.
This process can be performed via:
• Navigator for I
• Check Out (CHKOUT) Command
• Check In (CHKIN) Command
IBM added subtree support in v6.1 so that users can now check out/in
entire folders or directories.
PC Properties
HelpSystems Corporate Overview. All rights reserved.
Under the covers, all IFS objects are still IBM i objects and
therefore have IBM i authorities.
Actions must still meet the requirements set forth by IBM i.
For example: To delete a stream file, you must have *OBJEXIST
authority. This is an object authority that’s not associated with *R,
*W, or *X and must be granted separately, or inherited from the
directory.
IBM i Authorities
HelpSystems Corporate Overview. All rights reserved.
Batten Down the Hatches
HelpSystems Corporate Overview. All rights reserved.
With the exception of “root,” most IBM directories are already
configured with the appropriate security settings. Vendor or user
directories may not be.
It’s easy to “over secure” the IFS due to the nature of nested
directories and unfamiliar security mechanisms.
Plan carefully and make detailed notes of changes so that you can
always revert back if there is a problem.
It All Starts at the “Root”
HelpSystems Corporate Overview. All rights reserved.
Do NOT set
*PUBLIC to
*EXCLUDE
The “root” (/) folder ships with powerful *PUBLIC permissions:
• DTAAUT(*RWX)
• OBJAUT(*ALL)
Instead, consider assigning the following:
• DTAAUT(*RX)
• OBJAUT(*NONE)
Restrict the Right to Write
HelpSystems Corporate Overview. All rights reserved.
A user requires *X authority to each directory in the folder structure.
However, without *R, they cannot see the contents of the directory.
Consider whether a user should be able to access (read or write) the
contents of the parent folder(s) or just simply navigate to a subfolder.
Restrict the Right to Write
HelpSystems Corporate Overview. All rights reserved.
Consider giving users their own directory under /home:
Set DTAAUT(*X) for *PUBLIC on ‘/home’
Set DTAAUT(*EXCLUDE) for *PUBLIC on all user directories
Set DTAARA(*RWX) for the user on their own directory (e.g.
‘/home/rtatam’)
This enables a user to access his or her own directory, but not touch
(or see) other users' directories.
Restrict the Right to Write
HelpSystems Corporate Overview. All rights reserved.
IFS Permissions can be assigned through a traditional green screen
interface using: WRKAUT, CHGAUT, DSPAUT Or through the
Navigator for i interface.
Restrict The Right To Write
HelpSystems Corporate Overview. All rights reserved.
Most organizations don’t need users to be able to access the native
libraries and objects from remote clients like Access for i, NetServer,
and Java Toolbox.
Fortunately, IBM provides an authorization list to control who can
access QSYS.LIB:
Authorization List QPWFSERVER
Default *PUBLIC *USE
Recommended *PUBLIC *EXCLUDE
Warning: Not effective against *ALLOBJ users!
Restrict Access to Qsys.lib
HelpSystems Corporate Overview. All rights reserved.
Don’t give
every
user access to
IBM i Nav
Many organizations make their IFS accessible to client users by
establishing unnecessary file shares. Use Navigator for i to:
• Review & eliminate unnecessary file shares
• Make shares “read only” when possible
• Grant only *X permission to folders in shared path
• Do NOT share the “root” (/) folder
Manage File Shares
HelpSystems Corporate Overview. All rights reserved.
Deploy exit
programs to
better
audit IFS events
Similar to auditing of IBM i objects, the IFS also supports event
auditing.
• Ensure QAUDCTL system value includes the value of *OBJAUD to
“turn on” object auditing.
• Use CHGAUD command to specify the desired level of auditing for
each object or directory.
Audit IFS Object Access
HelpSystems Corporate Overview. All rights reserved.
As with libraries, each directory has a Create Object Auditing
(CRTOBJAUD) value to designate the auditing default for the contents
as they are created.
You need audit (*AUDIT) or all object (*ALLOBJ) special authority to
see the assigned auditing setting:
*SYSVAL, *USRPRF, *CHANGE, *ALL, *NONE
Audit IFS Object Access
HelpSystems Corporate Overview. All rights reserved.
IFS commands are (by default) secured from limited capability
users — LMTCPB(*YES).
Command-capable users might have access to the following powerful
native IFS commands:
Command(s) Shipped *PUBLIC
WRKLNK *USE
MD | MKDIR | CRTDIR *USE
RD | RMDIR | RMVDIR *USE
CD | CHGDIR | CHGCURDIR *USE
Secure Native IFS Commands
HelpSystems Corporate Overview. All rights reserved.
Other powerful IFS commands to be guarded include:
CPYTOSTMF Copy to Stream File
CPYFRMSTMF Copy from Stream File
CPYTOIMPF Copy to Import File
CPYFRMIMPF Copy from Import File
WRKAUT | CHGAUT Work | Change Authority
CHGOWN Change Owner
SAV | RST Save | Restore
Secure Native IFS Commands
HelpSystems Corporate Overview. All rights reserved.
The IFS does NOT support the adoption of authority.
This can represent a challenge to applications that are built on a
foundation of adoption.
Profile switching IS supported in the IFS, so use the IBM-provided
APIs or a tool like Powertech Authority Broker to temporarily alter
user privileges— akin to Superman’s phone booth.
Authority Adoption and Profile Switching
HelpSystems Corporate Overview. All rights reserved.
(Overly)
Privileged
Users
Permissive
Public & Private
Authority
Your
Security
Security Is at the Mercy of Multiple Controls
HelpSystems Corporate Overview. All rights reserved.
• Exit points enable a process to be temporarily“interrupted” by a
user-written program.
• There’s an exit point for FTP and ODBC, and yes, IFS!
• (Strongly) Consider implementing an exit program to audit and
control actions affecting the IFS.
Another Great Reason for an Exit Program
HelpSystems Corporate Overview. All rights reserved.
Works with
*ALLOBJ
users
The IFS exit point provides easy-to-interpret interrogation and supplemental
control of user activities, including:
• Allocate conversation
• Change file attributes request
• Create stream file or directory
• Delete file or directory
• List file attributes (or directory contents)
• Move file
• Open stream file
• Rename file
Another Great Reason for an Exit Program
HelpSystems Corporate Overview. All rights reserved.
An example of recording user activities within the IFS using an exit program:
Another Great Reason for an Exit Program
HelpSystems Corporate Overview. All rights reserved.
Don’t Overlook Disruption by Viruses
HelpSystems Corporate Overview. All rights reserved.
Long thought to be immune to the virus threat, IBM i can actually
act as the source of virus problems on your network.
While malicious code can reside natively, viruses can often impact
the IFS.
A Virus on IBM i? Oh, Surely Not!
And don’t think they can’t rename, delete, or encrypt native objects!
HelpSystems Corporate Overview. All rights reserved.
• Mapped Drives
• FTP
• Image Catalogs,NSF Mounts, UDFS Mounts
• Business Partners
• CDs
• High Availability Systems
• Backup Tapes
How Viruses Can Spread To and From IBM i
HelpSystems Corporate Overview. All rights reserved.
How Viruses Can Spread To and From IBM i
HelpSystems Corporate Overview. All rights reserved.
How Viruses Can Spread To and From IBM i
HelpSystems Corporate Overview. All rights reserved.
Check out
StandGuard
Anti-Virus
IBM i added system values (QSCANFS, QSCANFSCTL)
to interface with a commercial scanning solution for:
• On-demand scanning
• Open/close scanning (V5R3+) via exit point integration
• QIBM_QP0L_SCAN_OPEN – IFS Scan on Open
• QIBM_QP0L_SCAN_CLOSE – IFS Scan on Close
• Object integrity
• Alerting
Protect & Immunize Objects with Commercial Anti-Virus
HelpSystems Corporate Overview. All rights reserved.
Scanning from another server is BAD for several compelling
reasons:
• Requires a read/write share to ‘root’ to search and cleanse all
directories
• Requires an *ALLOBJ profile to effectively run the scan
• Network bandwidth is consumed by hundreds of thousands of
objects being moved around
• Transmits all objects in clear text
• The operating system remains unaware that a file is infected
But Don’t Scan from the Network!
HelpSystems Corporate Overview. All rights reserved.
…Or You Might Make the Situation Worse!
HelpSystems Corporate Overview. All rights reserved.
• Determine what applications are using the IFS (exit program)
• Understand how security works on the IFS
• Establish security for top-level folders like ‘root’ and ‘/home’
• Secure access to /QSYS.LIB
• Monitor and protect file shares (don’t share “root”) and make them
read-only whenever possible
• Audit and alert on user activities using an exit program
• Protect from viruses
• Test your security!
Summary of Today’s Lesson
HelpSystems Corporate Overview. All rights reserved.
Run a HelpSystems Security Scan
HelpSystems Corporate Overview. All rights reserved.
Security awareness among IBM i
professionals is generally low.
IBM i awareness among audit
professionals is even lower.
Some of the most valuable data is
stored on a Power Systems server
(iSeries, AS/400).
Most IBM i data is not secured and
the users are far too powerful.
Most data is easily accessed via PC
interfaces with little-to-no oversight
The Perfect IBM i Security “Storm”
HelpSystems Corporate Overview. All rights reserved.
Free Download:
2016 State of IBM i Security
https://www.mc-store.com/products/ibm-i-security-
administration-and-compliance-second-edition
Learn More About IBM i Security
HelpSystems Corporate Overview. All rights reserved.
Other (FREE) Resources
Please visit www.helpsystems.com to access:
• Demonstration Videos & Trial Downloads
• Product Information Data Sheets
• Guides & Technical Articles
• Customer Success Stories
• How-To Articles
• To request a FREE Security Scan
www.helpsystems.com 800-328-1000
HelpSystems Corporate Overview. All rights reserved.
Question and Answer
HelpSystems Corporate Overview. All rights reserved.
www.helpsystems.com

More Related Content

Viewers also liked

4 Ways to Merge IBM i Data with Microsoft Excel
4 Ways to Merge IBM i Data with Microsoft Excel4 Ways to Merge IBM i Data with Microsoft Excel
4 Ways to Merge IBM i Data with Microsoft ExcelHelpSystems
 
Agenda setmana 51 -desembre-curs16-17
Agenda setmana 51 -desembre-curs16-17Agenda setmana 51 -desembre-curs16-17
Agenda setmana 51 -desembre-curs16-176sise
 
Container communication on lattice #2
Container communication on lattice #2Container communication on lattice #2
Container communication on lattice #2Kenta Shinohara
 
Phát triển hoạt động thanh toán không dùng tiền mặt tại ngân hàng nông nghiệp...
Phát triển hoạt động thanh toán không dùng tiền mặt tại ngân hàng nông nghiệp...Phát triển hoạt động thanh toán không dùng tiền mặt tại ngân hàng nông nghiệp...
Phát triển hoạt động thanh toán không dùng tiền mặt tại ngân hàng nông nghiệp...https://www.facebook.com/garmentspace
 
Microsoft excel 2010 intermediated advanced
Microsoft excel 2010 intermediated advancedMicrosoft excel 2010 intermediated advanced
Microsoft excel 2010 intermediated advancedsmittichai chaiyawong
 
Знаете ли вы сказки А.С. Пушкина
Знаете ли вы сказки А.С. ПушкинаЗнаете ли вы сказки А.С. Пушкина
Знаете ли вы сказки А.С. ПушкинаNatalya Dyrda
 
La communication média et hors média
La communication média et hors médiaLa communication média et hors média
La communication média et hors médiaoz ressourcesorg
 

Viewers also liked (8)

4 Ways to Merge IBM i Data with Microsoft Excel
4 Ways to Merge IBM i Data with Microsoft Excel4 Ways to Merge IBM i Data with Microsoft Excel
4 Ways to Merge IBM i Data with Microsoft Excel
 
Agenda setmana 51 -desembre-curs16-17
Agenda setmana 51 -desembre-curs16-17Agenda setmana 51 -desembre-curs16-17
Agenda setmana 51 -desembre-curs16-17
 
Container communication on lattice #2
Container communication on lattice #2Container communication on lattice #2
Container communication on lattice #2
 
Phát triển hoạt động thanh toán không dùng tiền mặt tại ngân hàng nông nghiệp...
Phát triển hoạt động thanh toán không dùng tiền mặt tại ngân hàng nông nghiệp...Phát triển hoạt động thanh toán không dùng tiền mặt tại ngân hàng nông nghiệp...
Phát triển hoạt động thanh toán không dùng tiền mặt tại ngân hàng nông nghiệp...
 
Microsoft excel 2010 intermediated advanced
Microsoft excel 2010 intermediated advancedMicrosoft excel 2010 intermediated advanced
Microsoft excel 2010 intermediated advanced
 
Знаете ли вы сказки А.С. Пушкина
Знаете ли вы сказки А.С. ПушкинаЗнаете ли вы сказки А.С. Пушкина
Знаете ли вы сказки А.С. Пушкина
 
IT Service Catalog Examples
IT Service Catalog ExamplesIT Service Catalog Examples
IT Service Catalog Examples
 
La communication média et hors média
La communication média et hors médiaLa communication média et hors média
La communication média et hors média
 

More from HelpSystems

El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020HelpSystems
 
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...HelpSystems
 
Rbt jdbc odbc webinar
Rbt jdbc odbc webinar Rbt jdbc odbc webinar
Rbt jdbc odbc webinar HelpSystems
 
RPA en 45 minutos
RPA en 45 minutos RPA en 45 minutos
RPA en 45 minutos HelpSystems
 
Webinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsWebinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsHelpSystems
 
Automatización de Procesos de IT
Automatización de Procesos de ITAutomatización de Procesos de IT
Automatización de Procesos de ITHelpSystems
 
Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3HelpSystems
 
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPACaso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPAHelpSystems
 
Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3HelpSystems
 
Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2HelpSystems
 
Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1HelpSystems
 
Webinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringWebinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringHelpSystems
 
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
1 año de RGPD:  3 formas en las que HelpSystems puede ayudar1 año de RGPD:  3 formas en las que HelpSystems puede ayudar
1 año de RGPD: 3 formas en las que HelpSystems puede ayudarHelpSystems
 
Automate feature tour
Automate feature tourAutomate feature tour
Automate feature tourHelpSystems
 
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...HelpSystems
 
5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scriptsHelpSystems
 
CASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanCASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanHelpSystems
 
Webinar Security Scan
Webinar Security ScanWebinar Security Scan
Webinar Security ScanHelpSystems
 

More from HelpSystems (20)

El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020
 
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
 
Rbt jdbc odbc webinar
Rbt jdbc odbc webinar Rbt jdbc odbc webinar
Rbt jdbc odbc webinar
 
RPA en 45 minutos
RPA en 45 minutos RPA en 45 minutos
RPA en 45 minutos
 
Webinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsWebinar go anywhere_mft_scripts
Webinar go anywhere_mft_scripts
 
Automatización de Procesos de IT
Automatización de Procesos de ITAutomatización de Procesos de IT
Automatización de Procesos de IT
 
Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
 
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPACaso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
 
Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3
 
Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2
 
Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1
 
Webinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringWebinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business Monitoring
 
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
1 año de RGPD:  3 formas en las que HelpSystems puede ayudar1 año de RGPD:  3 formas en las que HelpSystems puede ayudar
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
 
Automate feature tour
Automate feature tourAutomate feature tour
Automate feature tour
 
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
 
5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts
 
CASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanCASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San Juan
 
Webinar Security Scan
Webinar Security ScanWebinar Security Scan
Webinar Security Scan
 

Recently uploaded

AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024VictoriaMetrics
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile EnvironmentVictorSzoltysek
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...masabamasaba
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 

Recently uploaded (20)

AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT  - Elevating Productivity in Today's Agile EnvironmentHarnessing ChatGPT  - Elevating Productivity in Today's Agile Environment
Harnessing ChatGPT - Elevating Productivity in Today's Agile Environment
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 

Don't Leave Your Server Vulnerable

  • 1. All trademarks and registered trademarks are the property of their respective owners.© HelpSystems LLC. All rights reserved. IFS Security—Don’t Leave Your Server Vulerable
  • 2. HelpSystems Corporate Overview. All rights reserved. Robin Tatam, CISM CBCA PCI-P Global Director of Security Technologies, HelpSystems +1 952-563-2768 robin.tatam@helpsystems.com Today’s Speaker
  • 3. HelpSystems Corporate Overview. All rights reserved. • Expansive Multi-Platform Software Portfolio • Comprehensive Professional Services • World-Class Security Experts: – Robin Tatam, CISM CBCA PCI-P – Carol Woodbury, CRISC • Member of PCI Security Standards Council • Authorized by NASBA to Issue CPE Credits for Security Education • Publisher of the Annual “State of IBM i Security” Report About the HelpSystems Security Investment
  • 4. HelpSystems Corporate Overview. All rights reserved. What Is the Mysterious IFS?
  • 5. HelpSystems Corporate Overview. All rights reserved. According to Wikipedia, it can be many things to many people: What Is the Mysterious IFS? • Independent Front Suspension • Indian Fertility Society • Initial Flight Screening • Initiative on Financial Security • Institute for Fiscal Studies • Insurance and Financial Services • Intensive Freshman Seminar • International Financial Statistics • International Food Standard • Integrated Forecast System
  • 6. HelpSystems Corporate Overview. All rights reserved. Integrated File System Integrated File System — on IBM midrange & mainframe systems (e.g. OS/400, MVS, VM/CMS), the POSIX compatible file system provided by the operating system, as opposed to the traditional non- POSIX file system it also supplies. What Is the Mysterious IFS?
  • 7. HelpSystems Corporate Overview. All rights reserved. • Added to OS/400 in V3R1 in 1994 • Integrates IBM i with UNIX, Windows, and others • Directory structure much like a PC • Provides access to data stored on integrated servers, or on other remote IBM i servers • Contains several pre-defined file systems: – All contained within a single root directory – Each with their own limitations and rules What Is the Mysterious IFS?
  • 8. HelpSystems Corporate Overview. All rights reserved. Contrary to popular belief, it was not an add-on to the existing file structures, but rather encompasses ALL of the file structures. This includes those that pre-date the IFS such as: Native Libraries QSYS.LIB Documents and Folders QDLS What Is the Mysterious IFS?
  • 9. HelpSystems Corporate Overview. All rights reserved. We ALL technically use the IFS as it encompasses QSYS.LIB Some other common uses of the IFS include: • Integrated PC servers (Intel processor) • NetServer (Explorer access to the IFS) • CD images for unattended installation • PASE environment for UNIX applications • IBM i Access (Client Access) & Navigator executables • Apache HTTP server • Tomcat application server • WebSphere application server • Lotus Domino • Digital Certificate Manager “I’m Not Even Using the ISF, I mean IFS!”
  • 10. HelpSystems Corporate Overview. All rights reserved. IBM i ships with its public access default to the IFS set to: Native objects = *CHANGE IFS root folder = *RWX plus all object authorities (aka *ALL) TIP: This should be changed ASAP! It’s Already Secure, Right?!”
  • 11. HelpSystems Corporate Overview. All rights reserved. Organizations often place tremendous trust in the people accessing their servers. Authorized users usually have privileges far in excess of any business requirement. “But Bill Has Worked Here for xx Years!” (insert big number)
  • 12. HelpSystems Corporate Overview. All rights reserved. According to the “State of IBM i Security Study,” most organizations still base their security on lack of user knowledge or malicious intent. • Average of 147 users with *ALLOBJ special authority • Average of 76 enabled profiles with default passwords “But Bill Has Worked Here for xx Years!” (insert big number)
  • 13. HelpSystems Corporate Overview. All rights reserved. But How Well Do We REALLY Know Him? Lots of people have skeletons in their closet! The cold reality of an economic downturn may cause (normally) trustworthy users to act out of desperation. And there are vices like gambling and drugs that often influence ethics. And, of course, anyone can make a legitimate mistake!
  • 14. HelpSystems Corporate Overview. All rights reserved. IBM i vs. Unix vs. PC
  • 15. HelpSystems Corporate Overview. All rights reserved. In IBM i, every object has data authorities and object authorities. Data authorities consist of: Read, Add, Update, Delete, and Execute Object Authorities consist of: Opr, Mgt, Exist, Alter, and Ref IBM i authorities (data and object) are typically assigned using one of four IBM-supplied templates: *USE, *CHANGE, *ALL, and *EXCLUDE Object Authority vs. Data Authority
  • 16. HelpSystems Corporate Overview. All rights reserved. Data Authorities – *READ - Required to read the object – *ADD, *UPD, *DLT — Required to change the object – *EXECUTE — Required to run a program or find an object Object Authorities – *OBJOPR — Required to operate on data (set if there are any data authorities) – *OBJMGT — Required to move, rename, or work with permissions – *OBJEXIST — Required to delete, save, and restore the object – *OBJALTER — Database authority – *OBJREF — Database authority IBM-Supplied Templates – *EXCLUDE — Specifically denies access to the object – *USE — *OBJOPR and *READ and *EXECUTE – *CHANGE — *OBJOPR and all data authorities – *ALL — All data and object authorities IBM i Authorities
  • 17. HelpSystems Corporate Overview. All rights reserved. IFS Security IBM i Authorities The IFS security model is a unique combination of IBM i authorities, PC file properties, and Unix file permissions. IBM i Authorities
  • 18. HelpSystems Corporate Overview. All rights reserved. For IFS objects,‘ObjOpr’ (Object Operational) authority is considered a data authority and NOT an object authority. Object Authority vs. Data Authority
  • 19. HelpSystems Corporate Overview. All rights reserved. In Unix terminology, we secure files and directories using a combination of Read (*R), Write (*W), and Execute (*X) permissions. As with *USE, *RX provides Read and Execute data authority and no object authorities (except ‘Opr’ as noted on the prior slide). As with *CHANGE, *RWX provides all data authorities and no object authorities (except ‘Opr’ as noted on the prior slide). *CHANGE *USE Unix Permissions There’s no Unix equivalent of *ALL
  • 20. HelpSystems Corporate Overview. All rights reserved. PC Properties PC properties, such as “read-only,” are another layer of protection against object abuse. Even *ALLOBJ users are unable to delete a file marked as read-only. Other file properties include: • Need to archive (PC and system) • Hidden file • PC system file
  • 21. HelpSystems Corporate Overview. All rights reserved. PC properties can be viewed and altered using: • IBM i’s CHGATR command • Navigator for i properties • Windows Explorer Properties (NetServer) • DOS “attrib” commands PC Properties
  • 22. HelpSystems Corporate Overview. All rights reserved. IBM i supports a check out/check in capability that restricts certain functions to the user who has checked out the file. This process can be performed via: • Navigator for I • Check Out (CHKOUT) Command • Check In (CHKIN) Command IBM added subtree support in v6.1 so that users can now check out/in entire folders or directories. PC Properties
  • 23. HelpSystems Corporate Overview. All rights reserved. Under the covers, all IFS objects are still IBM i objects and therefore have IBM i authorities. Actions must still meet the requirements set forth by IBM i. For example: To delete a stream file, you must have *OBJEXIST authority. This is an object authority that’s not associated with *R, *W, or *X and must be granted separately, or inherited from the directory. IBM i Authorities
  • 24. HelpSystems Corporate Overview. All rights reserved. Batten Down the Hatches
  • 25. HelpSystems Corporate Overview. All rights reserved. With the exception of “root,” most IBM directories are already configured with the appropriate security settings. Vendor or user directories may not be. It’s easy to “over secure” the IFS due to the nature of nested directories and unfamiliar security mechanisms. Plan carefully and make detailed notes of changes so that you can always revert back if there is a problem. It All Starts at the “Root”
  • 26. HelpSystems Corporate Overview. All rights reserved. Do NOT set *PUBLIC to *EXCLUDE The “root” (/) folder ships with powerful *PUBLIC permissions: • DTAAUT(*RWX) • OBJAUT(*ALL) Instead, consider assigning the following: • DTAAUT(*RX) • OBJAUT(*NONE) Restrict the Right to Write
  • 27. HelpSystems Corporate Overview. All rights reserved. A user requires *X authority to each directory in the folder structure. However, without *R, they cannot see the contents of the directory. Consider whether a user should be able to access (read or write) the contents of the parent folder(s) or just simply navigate to a subfolder. Restrict the Right to Write
  • 28. HelpSystems Corporate Overview. All rights reserved. Consider giving users their own directory under /home: Set DTAAUT(*X) for *PUBLIC on ‘/home’ Set DTAAUT(*EXCLUDE) for *PUBLIC on all user directories Set DTAARA(*RWX) for the user on their own directory (e.g. ‘/home/rtatam’) This enables a user to access his or her own directory, but not touch (or see) other users' directories. Restrict the Right to Write
  • 29. HelpSystems Corporate Overview. All rights reserved. IFS Permissions can be assigned through a traditional green screen interface using: WRKAUT, CHGAUT, DSPAUT Or through the Navigator for i interface. Restrict The Right To Write
  • 30. HelpSystems Corporate Overview. All rights reserved. Most organizations don’t need users to be able to access the native libraries and objects from remote clients like Access for i, NetServer, and Java Toolbox. Fortunately, IBM provides an authorization list to control who can access QSYS.LIB: Authorization List QPWFSERVER Default *PUBLIC *USE Recommended *PUBLIC *EXCLUDE Warning: Not effective against *ALLOBJ users! Restrict Access to Qsys.lib
  • 31. HelpSystems Corporate Overview. All rights reserved. Don’t give every user access to IBM i Nav Many organizations make their IFS accessible to client users by establishing unnecessary file shares. Use Navigator for i to: • Review & eliminate unnecessary file shares • Make shares “read only” when possible • Grant only *X permission to folders in shared path • Do NOT share the “root” (/) folder Manage File Shares
  • 32. HelpSystems Corporate Overview. All rights reserved. Deploy exit programs to better audit IFS events Similar to auditing of IBM i objects, the IFS also supports event auditing. • Ensure QAUDCTL system value includes the value of *OBJAUD to “turn on” object auditing. • Use CHGAUD command to specify the desired level of auditing for each object or directory. Audit IFS Object Access
  • 33. HelpSystems Corporate Overview. All rights reserved. As with libraries, each directory has a Create Object Auditing (CRTOBJAUD) value to designate the auditing default for the contents as they are created. You need audit (*AUDIT) or all object (*ALLOBJ) special authority to see the assigned auditing setting: *SYSVAL, *USRPRF, *CHANGE, *ALL, *NONE Audit IFS Object Access
  • 34. HelpSystems Corporate Overview. All rights reserved. IFS commands are (by default) secured from limited capability users — LMTCPB(*YES). Command-capable users might have access to the following powerful native IFS commands: Command(s) Shipped *PUBLIC WRKLNK *USE MD | MKDIR | CRTDIR *USE RD | RMDIR | RMVDIR *USE CD | CHGDIR | CHGCURDIR *USE Secure Native IFS Commands
  • 35. HelpSystems Corporate Overview. All rights reserved. Other powerful IFS commands to be guarded include: CPYTOSTMF Copy to Stream File CPYFRMSTMF Copy from Stream File CPYTOIMPF Copy to Import File CPYFRMIMPF Copy from Import File WRKAUT | CHGAUT Work | Change Authority CHGOWN Change Owner SAV | RST Save | Restore Secure Native IFS Commands
  • 36. HelpSystems Corporate Overview. All rights reserved. The IFS does NOT support the adoption of authority. This can represent a challenge to applications that are built on a foundation of adoption. Profile switching IS supported in the IFS, so use the IBM-provided APIs or a tool like Powertech Authority Broker to temporarily alter user privileges— akin to Superman’s phone booth. Authority Adoption and Profile Switching
  • 37. HelpSystems Corporate Overview. All rights reserved. (Overly) Privileged Users Permissive Public & Private Authority Your Security Security Is at the Mercy of Multiple Controls
  • 38. HelpSystems Corporate Overview. All rights reserved. • Exit points enable a process to be temporarily“interrupted” by a user-written program. • There’s an exit point for FTP and ODBC, and yes, IFS! • (Strongly) Consider implementing an exit program to audit and control actions affecting the IFS. Another Great Reason for an Exit Program
  • 39. HelpSystems Corporate Overview. All rights reserved. Works with *ALLOBJ users The IFS exit point provides easy-to-interpret interrogation and supplemental control of user activities, including: • Allocate conversation • Change file attributes request • Create stream file or directory • Delete file or directory • List file attributes (or directory contents) • Move file • Open stream file • Rename file Another Great Reason for an Exit Program
  • 40. HelpSystems Corporate Overview. All rights reserved. An example of recording user activities within the IFS using an exit program: Another Great Reason for an Exit Program
  • 41. HelpSystems Corporate Overview. All rights reserved. Don’t Overlook Disruption by Viruses
  • 42. HelpSystems Corporate Overview. All rights reserved. Long thought to be immune to the virus threat, IBM i can actually act as the source of virus problems on your network. While malicious code can reside natively, viruses can often impact the IFS. A Virus on IBM i? Oh, Surely Not! And don’t think they can’t rename, delete, or encrypt native objects!
  • 43. HelpSystems Corporate Overview. All rights reserved. • Mapped Drives • FTP • Image Catalogs,NSF Mounts, UDFS Mounts • Business Partners • CDs • High Availability Systems • Backup Tapes How Viruses Can Spread To and From IBM i
  • 44. HelpSystems Corporate Overview. All rights reserved. How Viruses Can Spread To and From IBM i
  • 45. HelpSystems Corporate Overview. All rights reserved. How Viruses Can Spread To and From IBM i
  • 46. HelpSystems Corporate Overview. All rights reserved. Check out StandGuard Anti-Virus IBM i added system values (QSCANFS, QSCANFSCTL) to interface with a commercial scanning solution for: • On-demand scanning • Open/close scanning (V5R3+) via exit point integration • QIBM_QP0L_SCAN_OPEN – IFS Scan on Open • QIBM_QP0L_SCAN_CLOSE – IFS Scan on Close • Object integrity • Alerting Protect & Immunize Objects with Commercial Anti-Virus
  • 47. HelpSystems Corporate Overview. All rights reserved. Scanning from another server is BAD for several compelling reasons: • Requires a read/write share to ‘root’ to search and cleanse all directories • Requires an *ALLOBJ profile to effectively run the scan • Network bandwidth is consumed by hundreds of thousands of objects being moved around • Transmits all objects in clear text • The operating system remains unaware that a file is infected But Don’t Scan from the Network!
  • 48. HelpSystems Corporate Overview. All rights reserved. …Or You Might Make the Situation Worse!
  • 49. HelpSystems Corporate Overview. All rights reserved. • Determine what applications are using the IFS (exit program) • Understand how security works on the IFS • Establish security for top-level folders like ‘root’ and ‘/home’ • Secure access to /QSYS.LIB • Monitor and protect file shares (don’t share “root”) and make them read-only whenever possible • Audit and alert on user activities using an exit program • Protect from viruses • Test your security! Summary of Today’s Lesson
  • 50. HelpSystems Corporate Overview. All rights reserved. Run a HelpSystems Security Scan
  • 51. HelpSystems Corporate Overview. All rights reserved. Security awareness among IBM i professionals is generally low. IBM i awareness among audit professionals is even lower. Some of the most valuable data is stored on a Power Systems server (iSeries, AS/400). Most IBM i data is not secured and the users are far too powerful. Most data is easily accessed via PC interfaces with little-to-no oversight The Perfect IBM i Security “Storm”
  • 52. HelpSystems Corporate Overview. All rights reserved. Free Download: 2016 State of IBM i Security https://www.mc-store.com/products/ibm-i-security- administration-and-compliance-second-edition Learn More About IBM i Security
  • 53. HelpSystems Corporate Overview. All rights reserved. Other (FREE) Resources Please visit www.helpsystems.com to access: • Demonstration Videos & Trial Downloads • Product Information Data Sheets • Guides & Technical Articles • Customer Success Stories • How-To Articles • To request a FREE Security Scan www.helpsystems.com 800-328-1000
  • 54. HelpSystems Corporate Overview. All rights reserved. Question and Answer
  • 55. HelpSystems Corporate Overview. All rights reserved. www.helpsystems.com