SlideShare a Scribd company logo
1 of 84
Download to read offline
All trademarks and registered trademarks are the property of their respective owners.© HelpSystems LLC. All rights reserved.
2016
Revealing the New State of
IBM i Security: The Good, the
Bad, and the Downright Ugly
2016
HelpSystems Corporate Overview. All rights reserved.
• Introduction
• Regulations on IBM i
• Conducting the Study
• The State of IBM i Security Study
• Questions and Answers
Today’s Agenda
UP NEXT...
Introduction
HelpSystems Corporate Overview. All rights reserved.
Today’s Speaker
Robin Tatam, CBCA CISM
Director of Security Technologies
+1 952-563-2768
robin.tatam@helpsystems.com
HelpSystems Corporate Overview. All rights reserved.
• Premier Provider of Security Solutions & Services
– 19 years in the security industry as an established thought leader
– Customers in over 70 countries, representing every industry
– Security subject matter expert for COMMON
• IBM Advanced Business Partner
• Member of PCI Security Standards Council
• Authorized by NASBA to issue CPE Credits for Security Education
• Publisher of the Annual“State of IBM i Security Study”
About PowerTech
HelpSystems Corporate Overview. All rights reserved.
HelpSystems Corporate Overview. All rights reserved.
If you wish to receive CPE Credit for today’s
session:
• Send an email to robin.tatam@helpsystems.com
• Answer polling questions
• 1 CPE Credit will be issued within 2-4 weeks
CPE Credit
UP NEXT...
Regulations on IBM i
HelpSystems Corporate Overview. All rights reserved.
Why Do I Need to Audit?
• Legislation, such as Sarbanes-Oxley
(SOX), HIPAA, GLBA, State Privacy Acts
• Industry regulations, such as Payment
Card Industry (PCI DSS)
• Internal activity tracking
• High availability
• Application research & debugging
HelpSystems Corporate Overview. All rights reserved.
• Is there a company security policy?
(We’ve got one to help you get started.)
• Guidelines and Standards
– COBIT
– ISO 27002 (formerly known as 17799)
– ITIL
Which Standards Do I Audit Against?
HelpSystems Corporate Overview. All rights reserved.
IT Controls – an Auditor’s Perspective
Can users perform
functions/activities that are
in conflict with their job
responsibilities?
Can users modify/corrupt
application data?
Can users circumvent
controls to initiate/record
unauthorized transactions?
Can users engage in fraud
and cover their tracks?
HelpSystems Corporate Overview. All rights reserved.
The Auditor’s Credo…
“Of course I
believe you…”
(But you still have to prove it to me)
HelpSystems Corporate Overview. All rights reserved.
Breach Sources
HelpSystems Corporate Overview. All rights reserved.
Breach Sources
UP NEXT...
Conducting the Study
HelpSystems Corporate Overview. All rights reserved.
Help IT managers and auditors understand IBM i security
exposures
Focus on top areas of concern in meeting regulatory
compliance
Help IT develop strategic plans to address—or confirm—
high risk vulnerabilities
Purpose of the Study
HelpSystems Corporate Overview. All rights reserved.
How We Collect the Data
Schedule your own security scan at www.helpsystems.com/powertech
• PowerTech Security Scan
– Launched from a PC
– Collects security data
– Data for the study are anonymous
• Companies are self-selected
– More or less security-aware?
• Study first published in 2004
– Over 2,500 participants since inception
HelpSystems Corporate Overview. All rights reserved.
Be a Part of the Study!
(Submission of data for use in the Security Study is optional)
HelpSystems Corporate Overview. All rights reserved.
Summary provides
auditors & executives with
visual indicators
HelpSystems Corporate Overview. All rights reserved.
IBM i registry is reviewed
to see if network events
are audited or controlled
HelpSystems Corporate Overview. All rights reserved.
*PUBLIC authority to
application libraries
are interrogated & reported
HelpSystems Corporate Overview. All rights reserved.
User profiles are analyzed
for adequate controls and
suspicious activity
HelpSystems Corporate Overview. All rights reserved.
Review of numerous
critical system values
that impact security
HelpSystems Corporate Overview. All rights reserved.
Determine if auditing is
active and what types of
events are being logged
HelpSystems Corporate Overview. All rights reserved.
Determine how many users
have administrator privileges
(special authorities)
HelpSystems Corporate Overview. All rights reserved.
• Administrative Privileges (powerful users)
• Public Authority (to libraries and data)
• Network Access (through TCP interfaces)
• User Vulnerabilities and Password Policy
• Security System Values
• System Audit Controls
• Anti-Virus Controls
Major Areas of Review
UP NEXT...
The State of IBM i Security Study
HelpSystems Corporate Overview. All rights reserved.
Assessed 177 different systems throughout 2015
Settings reviewed from a total of:
– 238,409 User Profiles
– 94,066 Libraries
On average, each assessed system had:
– 1,347 Users
– 531 Libraries
State of IBM i Security Overall
That’s double the
number from 2015!
HelpSystems Corporate Overview. All rights reserved.
State of IBM i Security Overall
Installed Version of IBM i
V7R1M0
76%
V6R1M0
11%
V7R2M0
6%
V5R4M0
7%
HelpSystems Corporate Overview. All rights reserved.
QSecurity
System Security Level
System Security Level
HelpSystems Corporate Overview. All rights reserved.
QSECURITY
System Security Level
Failing the Recommended Minimum Security Level
HelpSystems Corporate Overview. All rights reserved.
What Does IBM Say about Security Level 30?
HelpSystems Corporate Overview. All rights reserved.
Auditing Events?
15%
85%
Systems Using the IBM i Audit Journal
HelpSystems Corporate Overview. All rights reserved.
Most “Invalid Sign-On Attempts” Found
This is the number of attempts that someone made using
one profile to access one system partition!
Would you detect an intrusion attempt?
610,387
HelpSystems Corporate Overview. All rights reserved.
Most “Invalid Sign-On Attempts” Found
Would you detect an intrusion attempt?
610,387
This is the number of attempts that someone made using
one profile to access one system partition!
HelpSystems Corporate Overview. All rights reserved.
Most “Invalid Sign-On Attempts” Found
Systems with a profile that had experienced
more than 1,000 invalid attempts:
48%
HelpSystems Corporate Overview. All rights reserved.
What Should I Look For?
HelpSystems Corporate Overview. All rights reserved.
What Good Is Audit Journal Data?
• Mountains of raw data
• Multiple places to look
• Frustrating manual reporting
processes
As a result, IT often ignores the
data, or just looks on the day
before the auditors arrive.
HelpSystems Corporate Overview. All rights reserved.
84% of systems had an IBM audit journal (QAUDJRN)
24% of those had a recognized auditing tool installed
18% of servers had the auditing control system turned off
610,000 invalid sign-on attempts against a single profile!
Would you be more concerned if it was the QSECOFR profile?
Is Anyone Paying Attention?
HelpSystems Corporate Overview. All rights reserved.
What Is *PUBLIC?
*PUBLIC is a special reference to any user that is
not explicitly named and given an authority.
(Although sometimes referred as “anonymous”
access, the user still needs credentials and is not
anonymous to the organization.)
HelpSystems Corporate Overview. All rights reserved.
• The one and only library authority that keeps users out is
*EXCLUDE.
• A policy of “deny by default” calls for *PUBLIC to be excluded and
then authorized, named users or groups granted the appropriate
access.
• WARNING: A user can (potentially) delete objects with only *USE
authority to the library.
Deny by Default
HelpSystems Corporate Overview. All rights reserved.
Who Cares?
HelpSystems Corporate Overview. All rights reserved.
Who Cares?
HelpSystems Corporate Overview. All rights reserved.
Public Authority to Libraries
*EXCLUDE
6%
*CHANGE
61%
*USE
22%
*ALL
9%
*AUTL
1%
HelpSystems Corporate Overview. All rights reserved.
When New Objects Are Created
Library Default - Create Authority
System Default - Create Authority
HelpSystems Corporate Overview. All rights reserved.
Many IBM i applications rely on menu security because…
– It’s easy to build
– It’s the legacy of many existing business applications
Menu security design assumes:
– Access originates only via the menus
– No users have command line permission
– Users can’t have access to SQL-based tools
Menu security is often accompanied by:
– Users belonging to a Group that owns the objects
– *PUBLIC being granted broad (*CHANGE) access to data
Network Access Control
HelpSystems Corporate Overview. All rights reserved.
Network Access Control
ODBC isn’t rocket
science anymore
HelpSystems Corporate Overview. All rights reserved.
Are These Services Running?
Systems with FTP Autostarted
HelpSystems Corporate Overview. All rights reserved.
Are These Services Running?
Systems with REXEC Autostarted
HelpSystems Corporate Overview. All rights reserved.
A New Function?
The function of an exit program can include anything the
programmer codes within it—including unauthorized acts! - but
security officers typically want network exit programs to:
• Audit (as IBM i doesn’t)
• Control Access (as good object security is rare & inflexible)
The exit program returns a pass/fail indicator to the exit point.
In the 1990s, IBM supplemented
Object Level security with a suite of
exit points, which are temporary
interruptions in an OS process in
order to invoke a user-written
program.
HelpSystems Corporate Overview. All rights reserved.
Exit Program Coverage
One or More Exit Programs in Place
HelpSystems Corporate Overview. All rights reserved.
Exit Program Coverage
Complete Exit Program Coverage
8%
92%
HelpSystems Corporate Overview. All rights reserved.
Administrator Privileges
Special Authority (aka Privileges)
All Object
The “gold key” to every object and almost every administrative
operation on the system, including unstoppable data access.
*ALLOBJ *SECADM *IOSYSCFG *AUDIT *SPLCTL *SERVICE *JOBCTL *SAVSYS
HelpSystems Corporate Overview. All rights reserved.
Administrator Privileges
Special Authority (aka Privileges)
Security Administration
Enables a user to create and maintain the system user profiles
without requiring the user to be in the *SECOFR user class or giving
*ALLOBJ authority.
*ALLOBJ *SECADM *IOSYSCFG *AUDIT *SPLCTL *SERVICE *JOBCTL *SAVSYS
HelpSystems Corporate Overview. All rights reserved.
Administrator Privileges
Special Authority (aka Privileges)
I/O Systems Configuration
Allows the user to create, delete, and manage devices, lines, and
controllers. Also permits the configuration of TCP/IP, and the start of
associated servers (e.g., HTTP).
*ALLOBJ *SECADM *IOSYSCFG *AUDIT *SPLCTL *SERVICE *JOBCTL *SAVSYS
HelpSystems Corporate Overview. All rights reserved.
Administrator Privileges
Special Authority (aka Privileges)
Audit
The user is permitted to manage all aspects of auditing, including
setting the audit system values and running the audit commands
(CHGOBJAUD / CHGUSRAUD).
*ALLOBJ *SECADM *IOSYSCFG *AUDIT *SPLCTL *SERVICE *JOBCTL *SAVSYS
HelpSystems Corporate Overview. All rights reserved.
Administrator Privileges
Special Authority (aka Privileges)
Spool Control
This is the ALLOBJ of Spooled Files and allows a user to view, delete,
hold, or release any spooled file in any output queue, regardless of
restrictions.
*ALLOBJ *SECADM *IOSYSCFG *AUDIT *SPLCTL *SERVICE *JOBCTL *SAVSYS
HelpSystems Corporate Overview. All rights reserved.
Administrator Privileges
Special Authority (aka Privileges)
Service
This allows a user to access the System Service Tools (SST) login,
although they also need an SST login since V5R1.
*ALLOBJ *SECADM *IOSYSCFG *AUDIT *SPLCTL *SERVICE *JOBCTL *SAVSYS
HelpSystems Corporate Overview. All rights reserved.
Administrator Privileges
Special Authority (aka Privileges)
Job Control
This enables a user to start/end subsystems and manipulate other
users’ jobs. It also provides access to spooled files in output queues
designated as “operator control.”
*ALLOBJ *SECADM *IOSYSCFG *AUDIT *SPLCTL *SERVICE *JOBCTL *SAVSYS
HelpSystems Corporate Overview. All rights reserved.
Administrator Privileges
Special Authority (aka Privileges)
Save System
This enables a user to perform save/restore operations on any object
on the system, even if there is insufficient authority to use the object.
* Be extra cautious when securing objects at a library level only *
*ALLOBJ *SECADM *IOSYSCFG *AUDIT *SPLCTL *SERVICE *JOBCTL *SAVSYS
HelpSystems Corporate Overview. All rights reserved.
Administrator Privileges
IBM i Special Authorities
HelpSystems Corporate Overview. All rights reserved.
IBM i Special Authorities
Administrator Privileges
Try to get down to < 10
profiles with SPCAUTs
HelpSystems Corporate Overview. All rights reserved.
Endless News Reports of Insider Breaches
HelpSystems Corporate Overview. All rights reserved.
Password vs. Passphrase
0
20
40
60
80
100
120
140
0 1 2 3
No.ofSystems
System Password Level
HelpSystems Corporate Overview. All rights reserved.
Password vs. Passphrase
0
20
40
60
80
100
120
140
0 1 2 3
No.ofSystems
System Password Level
Password
(10 character
maximum)
Passphrase
(128 character
maximum)
HelpSystems Corporate Overview. All rights reserved.
Minimum Password Length
Minimum Password Length
HelpSystems Corporate Overview. All rights reserved.
Minimum Password Leng
Minimum Password Length
Not too hard to
guess your way in!
HelpSystems Corporate Overview. All rights reserved.
Password Expiration
1 2 1 1 1
12
1
20
2 1
68
1 1 1
5
1 1
62
0
10
20
30
40
50
60
70
80
28 30 31 36 42 45 55 60 70 72 90 92 100 120 180 365 366 *NONE
No.ofSystems
Password Expiration Period (Days)
HelpSystems Corporate Overview. All rights reserved.
Other Password Rules
5%
95%
Limits Imposed
Character Restrictions in Password
HelpSystems Corporate Overview. All rights reserved.
Other Password Rules
56%
44% Digit Required
Password Must Include A Digit
HelpSystems Corporate Overview. All rights reserved.
How Many Attempts?
88
13
50
8
1 1
4 5
2 3
7
0
10
20
30
40
50
60
70
80
90
100
3 4 5 6 7 8 10 15 20 25 *NOMAX
No.ofAttempts
Maximum Signon Attempts Allowed
HelpSystems Corporate Overview. All rights reserved.
88
13
50
8
1 1
4 5
2 3
7
0
10
20
30
40
50
60
70
80
90
100
3 4 5 6 7 8 10 15 20 25 *NOMAX
No.ofAttempts
Maximum Signon Attempts Allowed
How Many Attempts?
Let’s hope this wasn’t the
server that experienced
650,000 invalid sign on
attempts.
HelpSystems Corporate Overview. All rights reserved.
And Then What?
Action for Exceeding Invalid Signon Attempts
56%
44%
Disable Workstation
Disable Profile
Disable Both
11%
61%
28%
HelpSystems Corporate Overview. All rights reserved.
Default passwords are banned by compliance mandates, and for
GOOD reason! Review and resolve using ANZDFTPWD
Default Passwords
All Default Passwords
Enabled, Default Passwords
HelpSystems Corporate Overview. All rights reserved.
One system had 2,199 users with default passwords.
99 systems had > 30 users with default passwords.
49 systems had > 100 users with default passwords.
Default Passwords
HelpSystems Corporate Overview. All rights reserved.
Inactive Profiles
HelpSystems Corporate Overview. All rights reserved.
Adopted Privileges
Programs can run with:
• Authority of the caller, plus…
• Authority of the program owner,
plus…
• Authority of the program owner
of other programs in the stack
96%
4%
Limits Imposed
Systems that restrict creation of
programs that adopt
HelpSystems Corporate Overview. All rights reserved.
“Limit Capabilities” controls what users can do on the system
command line.
Just remember some interfaces (e.g. FTP) do not check the setting
before processing some command requests!
5250 Command Line
HelpSystems Corporate Overview. All rights reserved.
Are you AV Scanning?
Scan on File OPEN
89%
11%
97%
3%
Scan on File CLOSE
HelpSystems Corporate Overview. All rights reserved.
248,095 Reasons To Scan Your IFS!
HelpSystems Corporate Overview. All rights reserved.
The Perfect Storm of Vulnerability
Some of the most valuable data
in any organization is on your
Power Systems server (iSeries,
AS/400).
Most IBM i data is not secured
and the users are far too
powerful.
Security awareness among IBM i
professionals is generally low.
IBM i awareness among audit
and compliance professionals is
generally even lower.
HelpSystems Corporate Overview. All rights reserved.
The Call to Action
1.Conduct a Security Scan (free and
deep-dive options).
2.Remediate “low-hanging fruit” such
as default passwords and inactive
accounts.
3.Review appropriateness of profile
settings: password rules, limit
capabilities (command line), special
authorities, etc.
4.Perform intrusion tests over FTP
and ODBC to assess risk of data
leaks.
5.Evaluate solutions to help mitigate
risk.
HelpSystems Corporate Overview. All rights reserved.
Download the Full Study
www.helpsystems.com/powertech
resources
white papers
HelpSystems Corporate Overview. All rights reserved.
www.helpsystems.com/powertech
(800) 328-1000 | info.powertech@helpsystems.com

More Related Content

What's hot

SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5Lisa Niles
 
IS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaIS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaiFour Consultancy
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detailecarrow
 
Essential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingEssential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingPrecisely
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM IntegrationPrecisely
 
PCI Compliance White Paper
PCI Compliance White PaperPCI Compliance White Paper
PCI Compliance White PaperRaz-Lee Security
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleRochester Security Summit
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2Lisa Niles
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample ReportRandy James
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1Lisa Niles
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?VISTA InfoSec
 
Aging RPG Programmers in Charge of Your IBM i?
Aging RPG Programmers in Charge of Your IBM i?Aging RPG Programmers in Charge of Your IBM i?
Aging RPG Programmers in Charge of Your IBM i?HelpSystems
 
Essential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field SecurityEssential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field SecurityPrecisely
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliancesAhmadi Madi
 
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...iFour Consultancy
 
What's New in Security for IBM i?
What's New in Security for IBM i?What's New in Security for IBM i?
What's New in Security for IBM i?HelpSystems
 
More practical insights on the 20 critical controls
More practical insights on the 20 critical controlsMore practical insights on the 20 critical controls
More practical insights on the 20 critical controlsEnclaveSecurity
 
3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3aGene Kim
 

What's hot (20)

Institute of Internal Auditors Presentation 2014
Institute of Internal Auditors Presentation 2014Institute of Internal Auditors Presentation 2014
Institute of Internal Auditors Presentation 2014
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
 
IS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in indiaIS Audit Checklist- by Software development company in india
IS Audit Checklist- by Software development company in india
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detail
 
Essential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and AuditingEssential Layers of IBM i Security: Security Monitoring and Auditing
Essential Layers of IBM i Security: Security Monitoring and Auditing
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM Integration
 
PCI Compliance White Paper
PCI Compliance White PaperPCI Compliance White Paper
PCI Compliance White Paper
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample Report
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
Aging RPG Programmers in Charge of Your IBM i?
Aging RPG Programmers in Charge of Your IBM i?Aging RPG Programmers in Charge of Your IBM i?
Aging RPG Programmers in Charge of Your IBM i?
 
Essential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field SecurityEssential Layers of IBM i Security: File and Field Security
Essential Layers of IBM i Security: File and Field Security
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliances
 
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
What's New in Security for IBM i?
What's New in Security for IBM i?What's New in Security for IBM i?
What's New in Security for IBM i?
 
More practical insights on the 20 critical controls
More practical insights on the 20 critical controlsMore practical insights on the 20 critical controls
More practical insights on the 20 critical controls
 
3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a
 

Similar to Revealing the 2016 State of IBM i Security

Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...PECB
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostPrecisely
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsIBM Security
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis Belsis MPhil/MRes/BSc
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowPrecisely
 
An Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsAn Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsHelpSystems
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...akquinet enterprise solutions GmbH
 
4 florin coada - dast automation, more value for less work
4   florin coada - dast automation, more value for less work4   florin coada - dast automation, more value for less work
4 florin coada - dast automation, more value for less workIevgenii Katsan
 
IBM i Security Study
IBM i Security StudyIBM i Security Study
IBM i Security StudyHelpSystems
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Decisions
 
Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?Precisely
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceSolarWinds
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure OrganizationsHelpSystems
 
Compliance and Event Monitoring with PowerSC Tools for IBM i
Compliance and Event Monitoring with PowerSC Tools for IBM iCompliance and Event Monitoring with PowerSC Tools for IBM i
Compliance and Event Monitoring with PowerSC Tools for IBM itaford
 

Similar to Revealing the 2016 State of IBM i Security (20)

Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
Best Practices for Access Reviews - How to Reduce Risks and Improve Operation...
 
Orientation in IT Audit
Orientation in IT AuditOrientation in IT Audit
Orientation in IT Audit
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control Costs
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
 
An Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsAn Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power Systems
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
 
4 florin coada - dast automation, more value for less work
4   florin coada - dast automation, more value for less work4   florin coada - dast automation, more value for less work
4 florin coada - dast automation, more value for less work
 
IBM i Security Study
IBM i Security StudyIBM i Security Study
IBM i Security Study
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations
 
Compliance and Event Monitoring with PowerSC Tools for IBM i
Compliance and Event Monitoring with PowerSC Tools for IBM iCompliance and Event Monitoring with PowerSC Tools for IBM i
Compliance and Event Monitoring with PowerSC Tools for IBM i
 
IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
File000169
File000169File000169
File000169
 

More from HelpSystems

El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020HelpSystems
 
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...HelpSystems
 
Rbt jdbc odbc webinar
Rbt jdbc odbc webinar Rbt jdbc odbc webinar
Rbt jdbc odbc webinar HelpSystems
 
RPA en 45 minutos
RPA en 45 minutos RPA en 45 minutos
RPA en 45 minutos HelpSystems
 
Webinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsWebinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsHelpSystems
 
Automatización de Procesos de IT
Automatización de Procesos de ITAutomatización de Procesos de IT
Automatización de Procesos de ITHelpSystems
 
Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3HelpSystems
 
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPACaso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPAHelpSystems
 
Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3HelpSystems
 
Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2HelpSystems
 
Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1HelpSystems
 
Webinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringWebinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringHelpSystems
 
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
1 año de RGPD:  3 formas en las que HelpSystems puede ayudar1 año de RGPD:  3 formas en las que HelpSystems puede ayudar
1 año de RGPD: 3 formas en las que HelpSystems puede ayudarHelpSystems
 
Automate feature tour
Automate feature tourAutomate feature tour
Automate feature tourHelpSystems
 
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...HelpSystems
 
5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scriptsHelpSystems
 
CASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanCASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanHelpSystems
 
Webinar Security Scan
Webinar Security ScanWebinar Security Scan
Webinar Security ScanHelpSystems
 

More from HelpSystems (20)

El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020
 
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
 
Rbt jdbc odbc webinar
Rbt jdbc odbc webinar Rbt jdbc odbc webinar
Rbt jdbc odbc webinar
 
RPA en 45 minutos
RPA en 45 minutos RPA en 45 minutos
RPA en 45 minutos
 
Webinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsWebinar go anywhere_mft_scripts
Webinar go anywhere_mft_scripts
 
Automatización de Procesos de IT
Automatización de Procesos de ITAutomatización de Procesos de IT
Automatización de Procesos de IT
 
Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
 
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPACaso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
 
Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3
 
Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2
 
Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1
 
Webinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringWebinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business Monitoring
 
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
1 año de RGPD:  3 formas en las que HelpSystems puede ayudar1 año de RGPD:  3 formas en las que HelpSystems puede ayudar
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
 
Automate feature tour
Automate feature tourAutomate feature tour
Automate feature tour
 
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
 
5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts
 
CASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanCASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San Juan
 
Webinar Security Scan
Webinar Security ScanWebinar Security Scan
Webinar Security Scan
 

Recently uploaded

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 

Recently uploaded (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 

Revealing the 2016 State of IBM i Security

  • 1. All trademarks and registered trademarks are the property of their respective owners.© HelpSystems LLC. All rights reserved. 2016 Revealing the New State of IBM i Security: The Good, the Bad, and the Downright Ugly 2016
  • 2. HelpSystems Corporate Overview. All rights reserved. • Introduction • Regulations on IBM i • Conducting the Study • The State of IBM i Security Study • Questions and Answers Today’s Agenda
  • 4. HelpSystems Corporate Overview. All rights reserved. Today’s Speaker Robin Tatam, CBCA CISM Director of Security Technologies +1 952-563-2768 robin.tatam@helpsystems.com
  • 5. HelpSystems Corporate Overview. All rights reserved. • Premier Provider of Security Solutions & Services – 19 years in the security industry as an established thought leader – Customers in over 70 countries, representing every industry – Security subject matter expert for COMMON • IBM Advanced Business Partner • Member of PCI Security Standards Council • Authorized by NASBA to issue CPE Credits for Security Education • Publisher of the Annual“State of IBM i Security Study” About PowerTech
  • 6. HelpSystems Corporate Overview. All rights reserved.
  • 7. HelpSystems Corporate Overview. All rights reserved. If you wish to receive CPE Credit for today’s session: • Send an email to robin.tatam@helpsystems.com • Answer polling questions • 1 CPE Credit will be issued within 2-4 weeks CPE Credit
  • 9. HelpSystems Corporate Overview. All rights reserved. Why Do I Need to Audit? • Legislation, such as Sarbanes-Oxley (SOX), HIPAA, GLBA, State Privacy Acts • Industry regulations, such as Payment Card Industry (PCI DSS) • Internal activity tracking • High availability • Application research & debugging
  • 10. HelpSystems Corporate Overview. All rights reserved. • Is there a company security policy? (We’ve got one to help you get started.) • Guidelines and Standards – COBIT – ISO 27002 (formerly known as 17799) – ITIL Which Standards Do I Audit Against?
  • 11. HelpSystems Corporate Overview. All rights reserved. IT Controls – an Auditor’s Perspective Can users perform functions/activities that are in conflict with their job responsibilities? Can users modify/corrupt application data? Can users circumvent controls to initiate/record unauthorized transactions? Can users engage in fraud and cover their tracks?
  • 12. HelpSystems Corporate Overview. All rights reserved. The Auditor’s Credo… “Of course I believe you…” (But you still have to prove it to me)
  • 13. HelpSystems Corporate Overview. All rights reserved. Breach Sources
  • 14. HelpSystems Corporate Overview. All rights reserved. Breach Sources
  • 16. HelpSystems Corporate Overview. All rights reserved. Help IT managers and auditors understand IBM i security exposures Focus on top areas of concern in meeting regulatory compliance Help IT develop strategic plans to address—or confirm— high risk vulnerabilities Purpose of the Study
  • 17. HelpSystems Corporate Overview. All rights reserved. How We Collect the Data Schedule your own security scan at www.helpsystems.com/powertech • PowerTech Security Scan – Launched from a PC – Collects security data – Data for the study are anonymous • Companies are self-selected – More or less security-aware? • Study first published in 2004 – Over 2,500 participants since inception
  • 18. HelpSystems Corporate Overview. All rights reserved. Be a Part of the Study! (Submission of data for use in the Security Study is optional)
  • 19. HelpSystems Corporate Overview. All rights reserved. Summary provides auditors & executives with visual indicators
  • 20. HelpSystems Corporate Overview. All rights reserved. IBM i registry is reviewed to see if network events are audited or controlled
  • 21. HelpSystems Corporate Overview. All rights reserved. *PUBLIC authority to application libraries are interrogated & reported
  • 22. HelpSystems Corporate Overview. All rights reserved. User profiles are analyzed for adequate controls and suspicious activity
  • 23. HelpSystems Corporate Overview. All rights reserved. Review of numerous critical system values that impact security
  • 24. HelpSystems Corporate Overview. All rights reserved. Determine if auditing is active and what types of events are being logged
  • 25. HelpSystems Corporate Overview. All rights reserved. Determine how many users have administrator privileges (special authorities)
  • 26. HelpSystems Corporate Overview. All rights reserved. • Administrative Privileges (powerful users) • Public Authority (to libraries and data) • Network Access (through TCP interfaces) • User Vulnerabilities and Password Policy • Security System Values • System Audit Controls • Anti-Virus Controls Major Areas of Review
  • 27. UP NEXT... The State of IBM i Security Study
  • 28. HelpSystems Corporate Overview. All rights reserved. Assessed 177 different systems throughout 2015 Settings reviewed from a total of: – 238,409 User Profiles – 94,066 Libraries On average, each assessed system had: – 1,347 Users – 531 Libraries State of IBM i Security Overall That’s double the number from 2015!
  • 29. HelpSystems Corporate Overview. All rights reserved. State of IBM i Security Overall Installed Version of IBM i V7R1M0 76% V6R1M0 11% V7R2M0 6% V5R4M0 7%
  • 30. HelpSystems Corporate Overview. All rights reserved. QSecurity System Security Level System Security Level
  • 31. HelpSystems Corporate Overview. All rights reserved. QSECURITY System Security Level Failing the Recommended Minimum Security Level
  • 32. HelpSystems Corporate Overview. All rights reserved. What Does IBM Say about Security Level 30?
  • 33. HelpSystems Corporate Overview. All rights reserved. Auditing Events? 15% 85% Systems Using the IBM i Audit Journal
  • 34. HelpSystems Corporate Overview. All rights reserved. Most “Invalid Sign-On Attempts” Found This is the number of attempts that someone made using one profile to access one system partition! Would you detect an intrusion attempt? 610,387
  • 35. HelpSystems Corporate Overview. All rights reserved. Most “Invalid Sign-On Attempts” Found Would you detect an intrusion attempt? 610,387 This is the number of attempts that someone made using one profile to access one system partition!
  • 36. HelpSystems Corporate Overview. All rights reserved. Most “Invalid Sign-On Attempts” Found Systems with a profile that had experienced more than 1,000 invalid attempts: 48%
  • 37. HelpSystems Corporate Overview. All rights reserved. What Should I Look For?
  • 38. HelpSystems Corporate Overview. All rights reserved. What Good Is Audit Journal Data? • Mountains of raw data • Multiple places to look • Frustrating manual reporting processes As a result, IT often ignores the data, or just looks on the day before the auditors arrive.
  • 39. HelpSystems Corporate Overview. All rights reserved. 84% of systems had an IBM audit journal (QAUDJRN) 24% of those had a recognized auditing tool installed 18% of servers had the auditing control system turned off 610,000 invalid sign-on attempts against a single profile! Would you be more concerned if it was the QSECOFR profile? Is Anyone Paying Attention?
  • 40. HelpSystems Corporate Overview. All rights reserved. What Is *PUBLIC? *PUBLIC is a special reference to any user that is not explicitly named and given an authority. (Although sometimes referred as “anonymous” access, the user still needs credentials and is not anonymous to the organization.)
  • 41. HelpSystems Corporate Overview. All rights reserved. • The one and only library authority that keeps users out is *EXCLUDE. • A policy of “deny by default” calls for *PUBLIC to be excluded and then authorized, named users or groups granted the appropriate access. • WARNING: A user can (potentially) delete objects with only *USE authority to the library. Deny by Default
  • 42. HelpSystems Corporate Overview. All rights reserved. Who Cares?
  • 43. HelpSystems Corporate Overview. All rights reserved. Who Cares?
  • 44. HelpSystems Corporate Overview. All rights reserved. Public Authority to Libraries *EXCLUDE 6% *CHANGE 61% *USE 22% *ALL 9% *AUTL 1%
  • 45. HelpSystems Corporate Overview. All rights reserved. When New Objects Are Created Library Default - Create Authority System Default - Create Authority
  • 46. HelpSystems Corporate Overview. All rights reserved. Many IBM i applications rely on menu security because… – It’s easy to build – It’s the legacy of many existing business applications Menu security design assumes: – Access originates only via the menus – No users have command line permission – Users can’t have access to SQL-based tools Menu security is often accompanied by: – Users belonging to a Group that owns the objects – *PUBLIC being granted broad (*CHANGE) access to data Network Access Control
  • 47. HelpSystems Corporate Overview. All rights reserved. Network Access Control ODBC isn’t rocket science anymore
  • 48. HelpSystems Corporate Overview. All rights reserved. Are These Services Running? Systems with FTP Autostarted
  • 49. HelpSystems Corporate Overview. All rights reserved. Are These Services Running? Systems with REXEC Autostarted
  • 50. HelpSystems Corporate Overview. All rights reserved. A New Function? The function of an exit program can include anything the programmer codes within it—including unauthorized acts! - but security officers typically want network exit programs to: • Audit (as IBM i doesn’t) • Control Access (as good object security is rare & inflexible) The exit program returns a pass/fail indicator to the exit point. In the 1990s, IBM supplemented Object Level security with a suite of exit points, which are temporary interruptions in an OS process in order to invoke a user-written program.
  • 51. HelpSystems Corporate Overview. All rights reserved. Exit Program Coverage One or More Exit Programs in Place
  • 52. HelpSystems Corporate Overview. All rights reserved. Exit Program Coverage Complete Exit Program Coverage 8% 92%
  • 53. HelpSystems Corporate Overview. All rights reserved. Administrator Privileges Special Authority (aka Privileges) All Object The “gold key” to every object and almost every administrative operation on the system, including unstoppable data access. *ALLOBJ *SECADM *IOSYSCFG *AUDIT *SPLCTL *SERVICE *JOBCTL *SAVSYS
  • 54. HelpSystems Corporate Overview. All rights reserved. Administrator Privileges Special Authority (aka Privileges) Security Administration Enables a user to create and maintain the system user profiles without requiring the user to be in the *SECOFR user class or giving *ALLOBJ authority. *ALLOBJ *SECADM *IOSYSCFG *AUDIT *SPLCTL *SERVICE *JOBCTL *SAVSYS
  • 55. HelpSystems Corporate Overview. All rights reserved. Administrator Privileges Special Authority (aka Privileges) I/O Systems Configuration Allows the user to create, delete, and manage devices, lines, and controllers. Also permits the configuration of TCP/IP, and the start of associated servers (e.g., HTTP). *ALLOBJ *SECADM *IOSYSCFG *AUDIT *SPLCTL *SERVICE *JOBCTL *SAVSYS
  • 56. HelpSystems Corporate Overview. All rights reserved. Administrator Privileges Special Authority (aka Privileges) Audit The user is permitted to manage all aspects of auditing, including setting the audit system values and running the audit commands (CHGOBJAUD / CHGUSRAUD). *ALLOBJ *SECADM *IOSYSCFG *AUDIT *SPLCTL *SERVICE *JOBCTL *SAVSYS
  • 57. HelpSystems Corporate Overview. All rights reserved. Administrator Privileges Special Authority (aka Privileges) Spool Control This is the ALLOBJ of Spooled Files and allows a user to view, delete, hold, or release any spooled file in any output queue, regardless of restrictions. *ALLOBJ *SECADM *IOSYSCFG *AUDIT *SPLCTL *SERVICE *JOBCTL *SAVSYS
  • 58. HelpSystems Corporate Overview. All rights reserved. Administrator Privileges Special Authority (aka Privileges) Service This allows a user to access the System Service Tools (SST) login, although they also need an SST login since V5R1. *ALLOBJ *SECADM *IOSYSCFG *AUDIT *SPLCTL *SERVICE *JOBCTL *SAVSYS
  • 59. HelpSystems Corporate Overview. All rights reserved. Administrator Privileges Special Authority (aka Privileges) Job Control This enables a user to start/end subsystems and manipulate other users’ jobs. It also provides access to spooled files in output queues designated as “operator control.” *ALLOBJ *SECADM *IOSYSCFG *AUDIT *SPLCTL *SERVICE *JOBCTL *SAVSYS
  • 60. HelpSystems Corporate Overview. All rights reserved. Administrator Privileges Special Authority (aka Privileges) Save System This enables a user to perform save/restore operations on any object on the system, even if there is insufficient authority to use the object. * Be extra cautious when securing objects at a library level only * *ALLOBJ *SECADM *IOSYSCFG *AUDIT *SPLCTL *SERVICE *JOBCTL *SAVSYS
  • 61. HelpSystems Corporate Overview. All rights reserved. Administrator Privileges IBM i Special Authorities
  • 62. HelpSystems Corporate Overview. All rights reserved. IBM i Special Authorities Administrator Privileges Try to get down to < 10 profiles with SPCAUTs
  • 63. HelpSystems Corporate Overview. All rights reserved. Endless News Reports of Insider Breaches
  • 64. HelpSystems Corporate Overview. All rights reserved. Password vs. Passphrase 0 20 40 60 80 100 120 140 0 1 2 3 No.ofSystems System Password Level
  • 65. HelpSystems Corporate Overview. All rights reserved. Password vs. Passphrase 0 20 40 60 80 100 120 140 0 1 2 3 No.ofSystems System Password Level Password (10 character maximum) Passphrase (128 character maximum)
  • 66. HelpSystems Corporate Overview. All rights reserved. Minimum Password Length Minimum Password Length
  • 67. HelpSystems Corporate Overview. All rights reserved. Minimum Password Leng Minimum Password Length Not too hard to guess your way in!
  • 68. HelpSystems Corporate Overview. All rights reserved. Password Expiration 1 2 1 1 1 12 1 20 2 1 68 1 1 1 5 1 1 62 0 10 20 30 40 50 60 70 80 28 30 31 36 42 45 55 60 70 72 90 92 100 120 180 365 366 *NONE No.ofSystems Password Expiration Period (Days)
  • 69. HelpSystems Corporate Overview. All rights reserved. Other Password Rules 5% 95% Limits Imposed Character Restrictions in Password
  • 70. HelpSystems Corporate Overview. All rights reserved. Other Password Rules 56% 44% Digit Required Password Must Include A Digit
  • 71. HelpSystems Corporate Overview. All rights reserved. How Many Attempts? 88 13 50 8 1 1 4 5 2 3 7 0 10 20 30 40 50 60 70 80 90 100 3 4 5 6 7 8 10 15 20 25 *NOMAX No.ofAttempts Maximum Signon Attempts Allowed
  • 72. HelpSystems Corporate Overview. All rights reserved. 88 13 50 8 1 1 4 5 2 3 7 0 10 20 30 40 50 60 70 80 90 100 3 4 5 6 7 8 10 15 20 25 *NOMAX No.ofAttempts Maximum Signon Attempts Allowed How Many Attempts? Let’s hope this wasn’t the server that experienced 650,000 invalid sign on attempts.
  • 73. HelpSystems Corporate Overview. All rights reserved. And Then What? Action for Exceeding Invalid Signon Attempts 56% 44% Disable Workstation Disable Profile Disable Both 11% 61% 28%
  • 74. HelpSystems Corporate Overview. All rights reserved. Default passwords are banned by compliance mandates, and for GOOD reason! Review and resolve using ANZDFTPWD Default Passwords All Default Passwords Enabled, Default Passwords
  • 75. HelpSystems Corporate Overview. All rights reserved. One system had 2,199 users with default passwords. 99 systems had > 30 users with default passwords. 49 systems had > 100 users with default passwords. Default Passwords
  • 76. HelpSystems Corporate Overview. All rights reserved. Inactive Profiles
  • 77. HelpSystems Corporate Overview. All rights reserved. Adopted Privileges Programs can run with: • Authority of the caller, plus… • Authority of the program owner, plus… • Authority of the program owner of other programs in the stack 96% 4% Limits Imposed Systems that restrict creation of programs that adopt
  • 78. HelpSystems Corporate Overview. All rights reserved. “Limit Capabilities” controls what users can do on the system command line. Just remember some interfaces (e.g. FTP) do not check the setting before processing some command requests! 5250 Command Line
  • 79. HelpSystems Corporate Overview. All rights reserved. Are you AV Scanning? Scan on File OPEN 89% 11% 97% 3% Scan on File CLOSE
  • 80. HelpSystems Corporate Overview. All rights reserved. 248,095 Reasons To Scan Your IFS!
  • 81. HelpSystems Corporate Overview. All rights reserved. The Perfect Storm of Vulnerability Some of the most valuable data in any organization is on your Power Systems server (iSeries, AS/400). Most IBM i data is not secured and the users are far too powerful. Security awareness among IBM i professionals is generally low. IBM i awareness among audit and compliance professionals is generally even lower.
  • 82. HelpSystems Corporate Overview. All rights reserved. The Call to Action 1.Conduct a Security Scan (free and deep-dive options). 2.Remediate “low-hanging fruit” such as default passwords and inactive accounts. 3.Review appropriateness of profile settings: password rules, limit capabilities (command line), special authorities, etc. 4.Perform intrusion tests over FTP and ODBC to assess risk of data leaks. 5.Evaluate solutions to help mitigate risk.
  • 83. HelpSystems Corporate Overview. All rights reserved. Download the Full Study www.helpsystems.com/powertech resources white papers
  • 84. HelpSystems Corporate Overview. All rights reserved. www.helpsystems.com/powertech (800) 328-1000 | info.powertech@helpsystems.com