SlideShare a Scribd company logo
1 of 43
Addressing the Top 3
Real-world Security
Challenges for Your
IBM i Systems
Carol Woodbury | CISSP, CRISC, PCIP
DXR Security
Bill Hammond | Director, Product Marketing
Precisely
Today’s Topics
• Value of Your Data
• Top Three Security Challenges
• How Precisely Can Help
© DXRSecurity, All Rights Reserved.
Carol Woodbury
CISSP, CRISC, PCIP
Addressing the Top 3 Real-world Security
Challenges for Your IBM i Systems
Goals
Understand the benefits of implementing multiple
layers of defense (defense in depth)
Determine the value and risk level of your data
Develop a plan to implement as many layers as
needed to reduce risk to acceptable level
Not all Data is Created Equal
 Data has value to an
organization
 Most people think that means
data under regulatory
requirements
 Data unique to the organization
may have even more value
 Inventory
 Pricing
 Vendor list
 Monthly sales
What’s the Cost of the Data …
 Not being accurate?
 Not being available?
 Being stolen?
 Used by a competitor
 Sold on the Dark Web
 Being posted on the Internet?
Previous answers determine Value
Implement multiple layers of defense
based on Value of the data to your
organization
Scenario #1
Scenario #1: Protecting Against the Accidental Error
 Company A has multiple warehouses in different regions,
each with their own sales figures
 Employee in Warehouse 200 wrote an application using
ODBC to download his sales figures to a spreadsheet
 Company A was ok with this, just didn’t want employee to
accidentally upload the spreadsheet back to IBM i.
Acknowledge that Accidental Errors Occur
 Insiders
 Malicious insider – 14%
 Credential theft – 23%
 Negligence – 63%
 Ponemon Institute The Cost of
Insider Threats – 2020
 https://www.ibm.com/security/digita
l-assets/services/cost-of-insider-
threats/#/
Stats
Prevalence Cost
(Annualized)
Remediation /
Incident
Negligence 63% $4.58M $300K
Criminal insider 14% $4.08M $757K
Stolen credentials 23% $2.79 M $872K
Source: 2020 Ponemon Institute The Cost of Insider Threats
Layers of Defense Implemented
 Implemented IBM i object level
security, setting *PUBLIC to
*USE, granting more authority
for profiles running processes
that wrote to these files
 Removed users from group that
owned the application
 Reduced number of users with
*ALLOBJ
 Authority required can be
discovered via Authority
Collection
Scenario #2
Scenario #2: Malware
Two types of malware affect IBM i:
 Resident (Stored) in the IFS
 Coming in via a file share
 https://www.securityweek.com/industry
-reactions-ransomware-attack-colonial-
pipeline
 https://www.securityweek.com/fbi-
confirms-revil-ransomware-involved-
jbs-attack
 https://www.securityweek.com/white-
house-urges-private-companies-help-
fight-against-ransomware
File Shares
Worst possible scenario is to have a Read/Write share to root
Who Can Use a File Share?
 Unlike Windows, there is no permission on the share itself
 What the malware can do will depend on
 How the share is defined – Read only or Read/Write
 The user’s authority to the directory and objects in the directory
 Goals:
 Remove unused shares
 If required, reduce to Read only when possible
Share Permissions
Read share
Share
Permission
What can be
Accomplished
If user has at least *READ authority,
contents can be read
Contents cannot be updated regardless
of user’s authority to the object
Read/Write share If user has at least *READ authority,
contents can be read
If user has at least *W (write) authority,
contents can be modified
User must have sufficient authority for
the operation being attempted (either a
read or a write)
To Reduce the Risk Of Malware
 Educate your users!
 Back-ups
 Do them!
 Verify them!
 Store them separately
 Shares
 DO NOT SHARE ROOT !!!! (or QSYS.lib)
 Remove unnecessary shares
 Set shares to Read-only where possible
 Secure shared objects
If Infected …
 Pull out your incident response plan !
 Determine if you’re still under attack or if it’s contained
 Determine if you can resolve yourself or need to call in experts
 Determine if you need to notify law enforcement
 If ransomware, determine if ransom will be paid
Quality and availability of your back-ups may determine
whether you can recover from a malware attack
Real Scenario
Dear MsWoodbury,
I was forwarded your info. As of last night, we are being held hostage.We've
been in touch with the FBI and IBM.We have a ransom note on our servers. I can
be reached at xxx-xxx-xxxx
- via LinkedIn and Voicemail
24
Layers of Defense Implemented
 Develop incident response plan
 Clean up file shares
 Implement object level security on
appropriate directories
 Use an exit program to control who
can use the NetServer server
 Reduce the number of profiles with
*ALLOBJ special authority
 Encrypt critical/sensitive
information
 MFA
Scenario #3
Scenario #3: Malicious Attack
 Can occur from a variety of sources
 Malicious insider
 Nation-state attacks
 Competitors
 Attacker exploiting a vulnerability
 Microsoft Exchange Server
 https://www.afr.com/technology/thousands-of-aussie-businesses-hit-by-
microsoft-security-flaws-20210308-p578rc
 Malware
 Current ransomware exploits do recon on the network prior to encrypting files
and/or use credentials purchased on the dark web
 https://www.secureworldexpo.com/industry-news/doj-seizes-colonial-pipeline-
ransom-payment
Why Multiple Layers of Defense?
 Colonial was attacked using a VPN without MFA using a
profile that wasn’t in use with a password that is suspected
to have been purchased on the dark web.
 Layers:
 Client education – don’t use the same password everywhere!
 Password management – change passwords regularly even for
service accounts
 Profile management – delete or at least disable inactive profiles
 Require MFA
 Any one of these could have prevented access!
Protect Data
 Implement object level security
on critical data
 Reduce the number of users
with *ALLOBJ special authority
 Use RCAC to implement
additional privileges
 Encrypt critical data
 Use exit point software to further
restrict access (or at least log
access)
Encrypt all Sessions
 Internal communications are
often not encrypted
 WFH or WFS (Work from
Starbucks  ) not using a VPN
 Vulnerable to sniffing
Multi-factor Authentication (MFA)
 Requires two or more ‘factors’ to
authenticate (gain access to the
system)
 Something you know (password,
pin)
 Something you are (fingerprint,
facial recognition, optical scan)
 Something you have (token, bank
card)
 Recommended for at least
‘powerful’ profiles
 Helps prevent credential stuffing
Use IBM i to Alert to Trouble
 Are you sending IBM i
information to your SIEM? If
not, why not?
 See MC Press article for more
considerations
 https://www.mcpressonline.com/se
curity/ibm-i-os400-i5os/what-ibm-i-
information-should-i-be-sending-to-
my-siem
Monitor Audit Journal Entries to Detect an Attack
 PW
 ‘U’ entries where the User is “root” or “Admin” and attempt originates from outside of the
organization
 ‘P’ entries where many occur within a short period of time and for the well-known IBM i-
supplied profiles (QSYS, QSECOFR, QUSER, QSYSOPR, QPGMR, QSRV, QSRVBAS)
 JS
 Job start entries that originate from an unknown external IP address
 Job starts for unknown entries (such as QSECOFR)
 CP
 Password changes for QSECOFR and other IBM-supplied profiles
 Re-enablement of QSECOFR (if kept STATUS *DISABLED)
 VP
 Invalid password attempts via NetServer
Use Intrusion Detection
IM – Audit entries – Used to detect DDoS attacks and cryptomining malware
See
https://www.ibm.com/support/knowledgecenter/ssw_ibm_i_74/rzaub/rzaubkickoff.htm
>>> It takes tuning! <<<
Layers of Defense to Implement
 Protect the data
 Object level security
 Reduce *ALLOBJ
 RCAC
 Encryption
 Exit points
 Encrypt sessions
 MFA
 Use the audit journal
 SIEM
 Alerting
How many layers of defense is enough?
Must first answer:
What is the value of the data to your
organization?
What is the cost of it being inaccurate,
unavailable or stolen?
Focus!
Focus on the data which
is most valuable to the
organization!!!
Talking with Management
 Your suggestions for resolving
issues need to be high level
 Avoid technical terms
 Talking in terms of loss to the
business – operational risk and
how it can be prevented
 May have to explain to
management what (all) runs on
IBM i
 Again… in business terms
Talking with Management
 Your suggestions for resolving
issues need to be high level
 Avoid technical terms
 Talking in terms of loss to the
business – operational risk and
how it can be prevented
 May have to explain to
management what (all) runs on
IBM i
 Again… in business terms
Operational Risk
 Operational risk is caused by inadequate or failed internal
processes or controls and results in loss (e.g., time,
reputation, money)
 Example:
 We have data on one of our key servers – IBM i – that is
vulnerable to being infected with ransomware and I would like to
take steps to reduce that operational risk
Don’t get Overwhelmed!
With management, develop a plan
to address vulnerabilities
Do something!
Take a step – ANY step to reduce
your organization’s risk
For More
Information
RCAC Redpiece
 http://www.redbooks.ibm.com/abstracts/redp5110.html?Open
Intrusion Detection
 https://www.ibm.com/support/knowledgecenter/ssw_ibm_i_74/rzaub/rzau
bpdf.pdf?view=kc
IBM i Security Reference – PDF
https://www.ibm.com/support/knowledgecenter/ssw_ibm_i_74/rzarl/sc415302.
pdf?view=kc
 Chapters 2 and 3 – System Values
 Chapter 9 - Auditing
 Chapter 10 – Authority Collection
IBM i Security Administration and Compliance, 3nd edition, by Carol Woodbury,
2020.
DXR Security www.dxrsecurity.com
42
How Precisely Can Help
Assure Security
44
Compliance
Monitoring
• Assure Monitoring
and Reporting
• SIEM Integration
• Assure Db2 Data
Monitor
Access
Control
• Assure MFA
• Assure Elevated
Authority
Manager
• Assure System
Access Manager
Data
Privacy
• Assure Encryption
• Assure Secure File
Transfer
Malware
Prevention
• Assure MFA
• Assure Elevated
Authority
Manager
• Assure System
Access Manager
• Assure Monitoring
and Reporting
with SIEM
Integration
• Assure Encryption
Q & A
45
Thank You
46

More Related Content

What's hot

VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudSwapna Shetye
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthIBM Security
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to CyberthreatsIBM Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats IBM Security
 
SENTRY MBA Whitepaper.pdf
SENTRY MBA Whitepaper.pdfSENTRY MBA Whitepaper.pdf
SENTRY MBA Whitepaper.pdfMike Gonsalves
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityAliyuMuhammadButu
 
Mod2 wfbs new starter
Mod2 wfbs new starterMod2 wfbs new starter
Mod2 wfbs new starterIan Thiele
 
Evolution of ransomware
Evolution of ransomwareEvolution of ransomware
Evolution of ransomwareCharles Steve
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014Ricardo Resnik
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 
2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecuritySvetlana Belyaeva
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...Andris Soroka
 
Jedi mind tricks for building application security programs
Jedi mind tricks for building application security programsJedi mind tricks for building application security programs
Jedi mind tricks for building application security programsSecurity BSides London
 
VulnerabilityRewardsProgram
VulnerabilityRewardsProgramVulnerabilityRewardsProgram
VulnerabilityRewardsProgramTaha Kachwala
 

What's hot (20)

Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus Cloud
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient Truth
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
SENTRY MBA Whitepaper.pdf
SENTRY MBA Whitepaper.pdfSENTRY MBA Whitepaper.pdf
SENTRY MBA Whitepaper.pdf
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
DamballaOverview
DamballaOverviewDamballaOverview
DamballaOverview
 
Window of Compromise
Window of CompromiseWindow of Compromise
Window of Compromise
 
Mod2 wfbs new starter
Mod2 wfbs new starterMod2 wfbs new starter
Mod2 wfbs new starter
 
Evolution of ransomware
Evolution of ransomwareEvolution of ransomware
Evolution of ransomware
 
Presentation gdl
Presentation gdlPresentation gdl
Presentation gdl
 
Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
Jedi mind tricks for building application security programs
Jedi mind tricks for building application security programsJedi mind tricks for building application security programs
Jedi mind tricks for building application security programs
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
VulnerabilityRewardsProgram
VulnerabilityRewardsProgramVulnerabilityRewardsProgram
VulnerabilityRewardsProgram
 

Similar to Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems

"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeMelbourne IT
 
Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxhealdkathaleen
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against MalwarePrecisely
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EUAnatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EUUniversity of Essex
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldSafeNet
 
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Dalia Reda
 
Presentation defend your company against cyber threats with security solutions
Presentation   defend your company against cyber threats with security solutionsPresentation   defend your company against cyber threats with security solutions
Presentation defend your company against cyber threats with security solutionsxKinAnx
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guidelarry1401
 
10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises10 Security issues facing NZ Enterprises
10 Security issues facing NZ EnterprisesNigel Hanson
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTSimone Onofri
 
Failed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareIBM Security
 

Similar to Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems (20)

"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docx
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EUAnatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
 
IT Security for Nonprofits
IT Security for NonprofitsIT Security for Nonprofits
IT Security for Nonprofits
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative World
 
Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...Security Solution - IBM Business Connect Qatar Defend your company against cy...
Security Solution - IBM Business Connect Qatar Defend your company against cy...
 
Presentation defend your company against cyber threats with security solutions
Presentation   defend your company against cyber threats with security solutionsPresentation   defend your company against cyber threats with security solutions
Presentation defend your company against cyber threats with security solutions
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises
 
How websites are attacked
How websites are attackedHow websites are attacked
How websites are attacked
 
Module 10 e security-en
Module 10 e security-enModule 10 e security-en
Module 10 e security-en
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
 
How To Prevent Ransomware
How To Prevent RansomwareHow To Prevent Ransomware
How To Prevent Ransomware
 
Failed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated Ransomware
 

More from Precisely

Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenPrecisely
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfPrecisely
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Precisely
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Precisely
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Precisely
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fPrecisely
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsPrecisely
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPPrecisely
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenPrecisely
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsPrecisely
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyPrecisely
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowPrecisely
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellencePrecisely
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation ManagementPrecisely
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowPrecisely
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckPrecisely
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformancePrecisely
 

More from Precisely (20)

Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity Trends
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAP
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIs
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and Precisely
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center Excellence
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar Deck
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems

  • 1. Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems Carol Woodbury | CISSP, CRISC, PCIP DXR Security Bill Hammond | Director, Product Marketing Precisely
  • 2. Today’s Topics • Value of Your Data • Top Three Security Challenges • How Precisely Can Help
  • 3. © DXRSecurity, All Rights Reserved. Carol Woodbury CISSP, CRISC, PCIP Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
  • 4. Goals Understand the benefits of implementing multiple layers of defense (defense in depth) Determine the value and risk level of your data Develop a plan to implement as many layers as needed to reduce risk to acceptable level
  • 5. Not all Data is Created Equal  Data has value to an organization  Most people think that means data under regulatory requirements  Data unique to the organization may have even more value  Inventory  Pricing  Vendor list  Monthly sales
  • 6. What’s the Cost of the Data …  Not being accurate?  Not being available?  Being stolen?  Used by a competitor  Sold on the Dark Web  Being posted on the Internet?
  • 7. Previous answers determine Value Implement multiple layers of defense based on Value of the data to your organization
  • 9. Scenario #1: Protecting Against the Accidental Error  Company A has multiple warehouses in different regions, each with their own sales figures  Employee in Warehouse 200 wrote an application using ODBC to download his sales figures to a spreadsheet  Company A was ok with this, just didn’t want employee to accidentally upload the spreadsheet back to IBM i.
  • 10. Acknowledge that Accidental Errors Occur  Insiders  Malicious insider – 14%  Credential theft – 23%  Negligence – 63%  Ponemon Institute The Cost of Insider Threats – 2020  https://www.ibm.com/security/digita l-assets/services/cost-of-insider- threats/#/
  • 11. Stats Prevalence Cost (Annualized) Remediation / Incident Negligence 63% $4.58M $300K Criminal insider 14% $4.08M $757K Stolen credentials 23% $2.79 M $872K Source: 2020 Ponemon Institute The Cost of Insider Threats
  • 12. Layers of Defense Implemented  Implemented IBM i object level security, setting *PUBLIC to *USE, granting more authority for profiles running processes that wrote to these files  Removed users from group that owned the application  Reduced number of users with *ALLOBJ  Authority required can be discovered via Authority Collection
  • 14. Scenario #2: Malware Two types of malware affect IBM i:  Resident (Stored) in the IFS  Coming in via a file share  https://www.securityweek.com/industry -reactions-ransomware-attack-colonial- pipeline  https://www.securityweek.com/fbi- confirms-revil-ransomware-involved- jbs-attack  https://www.securityweek.com/white- house-urges-private-companies-help- fight-against-ransomware
  • 15.
  • 16. File Shares Worst possible scenario is to have a Read/Write share to root
  • 17. Who Can Use a File Share?  Unlike Windows, there is no permission on the share itself  What the malware can do will depend on  How the share is defined – Read only or Read/Write  The user’s authority to the directory and objects in the directory  Goals:  Remove unused shares  If required, reduce to Read only when possible
  • 18. Share Permissions Read share Share Permission What can be Accomplished If user has at least *READ authority, contents can be read Contents cannot be updated regardless of user’s authority to the object Read/Write share If user has at least *READ authority, contents can be read If user has at least *W (write) authority, contents can be modified User must have sufficient authority for the operation being attempted (either a read or a write)
  • 19. To Reduce the Risk Of Malware  Educate your users!  Back-ups  Do them!  Verify them!  Store them separately  Shares  DO NOT SHARE ROOT !!!! (or QSYS.lib)  Remove unnecessary shares  Set shares to Read-only where possible  Secure shared objects
  • 20. If Infected …  Pull out your incident response plan !  Determine if you’re still under attack or if it’s contained  Determine if you can resolve yourself or need to call in experts  Determine if you need to notify law enforcement  If ransomware, determine if ransom will be paid Quality and availability of your back-ups may determine whether you can recover from a malware attack
  • 21. Real Scenario Dear MsWoodbury, I was forwarded your info. As of last night, we are being held hostage.We've been in touch with the FBI and IBM.We have a ransom note on our servers. I can be reached at xxx-xxx-xxxx - via LinkedIn and Voicemail 24
  • 22. Layers of Defense Implemented  Develop incident response plan  Clean up file shares  Implement object level security on appropriate directories  Use an exit program to control who can use the NetServer server  Reduce the number of profiles with *ALLOBJ special authority  Encrypt critical/sensitive information  MFA
  • 24. Scenario #3: Malicious Attack  Can occur from a variety of sources  Malicious insider  Nation-state attacks  Competitors  Attacker exploiting a vulnerability  Microsoft Exchange Server  https://www.afr.com/technology/thousands-of-aussie-businesses-hit-by- microsoft-security-flaws-20210308-p578rc  Malware  Current ransomware exploits do recon on the network prior to encrypting files and/or use credentials purchased on the dark web  https://www.secureworldexpo.com/industry-news/doj-seizes-colonial-pipeline- ransom-payment
  • 25. Why Multiple Layers of Defense?  Colonial was attacked using a VPN without MFA using a profile that wasn’t in use with a password that is suspected to have been purchased on the dark web.  Layers:  Client education – don’t use the same password everywhere!  Password management – change passwords regularly even for service accounts  Profile management – delete or at least disable inactive profiles  Require MFA  Any one of these could have prevented access!
  • 26. Protect Data  Implement object level security on critical data  Reduce the number of users with *ALLOBJ special authority  Use RCAC to implement additional privileges  Encrypt critical data  Use exit point software to further restrict access (or at least log access)
  • 27. Encrypt all Sessions  Internal communications are often not encrypted  WFH or WFS (Work from Starbucks  ) not using a VPN  Vulnerable to sniffing
  • 28. Multi-factor Authentication (MFA)  Requires two or more ‘factors’ to authenticate (gain access to the system)  Something you know (password, pin)  Something you are (fingerprint, facial recognition, optical scan)  Something you have (token, bank card)  Recommended for at least ‘powerful’ profiles  Helps prevent credential stuffing
  • 29. Use IBM i to Alert to Trouble  Are you sending IBM i information to your SIEM? If not, why not?  See MC Press article for more considerations  https://www.mcpressonline.com/se curity/ibm-i-os400-i5os/what-ibm-i- information-should-i-be-sending-to- my-siem
  • 30. Monitor Audit Journal Entries to Detect an Attack  PW  ‘U’ entries where the User is “root” or “Admin” and attempt originates from outside of the organization  ‘P’ entries where many occur within a short period of time and for the well-known IBM i- supplied profiles (QSYS, QSECOFR, QUSER, QSYSOPR, QPGMR, QSRV, QSRVBAS)  JS  Job start entries that originate from an unknown external IP address  Job starts for unknown entries (such as QSECOFR)  CP  Password changes for QSECOFR and other IBM-supplied profiles  Re-enablement of QSECOFR (if kept STATUS *DISABLED)  VP  Invalid password attempts via NetServer
  • 31. Use Intrusion Detection IM – Audit entries – Used to detect DDoS attacks and cryptomining malware See https://www.ibm.com/support/knowledgecenter/ssw_ibm_i_74/rzaub/rzaubkickoff.htm >>> It takes tuning! <<<
  • 32. Layers of Defense to Implement  Protect the data  Object level security  Reduce *ALLOBJ  RCAC  Encryption  Exit points  Encrypt sessions  MFA  Use the audit journal  SIEM  Alerting
  • 33. How many layers of defense is enough? Must first answer: What is the value of the data to your organization? What is the cost of it being inaccurate, unavailable or stolen?
  • 34. Focus! Focus on the data which is most valuable to the organization!!!
  • 35. Talking with Management  Your suggestions for resolving issues need to be high level  Avoid technical terms  Talking in terms of loss to the business – operational risk and how it can be prevented  May have to explain to management what (all) runs on IBM i  Again… in business terms
  • 36. Talking with Management  Your suggestions for resolving issues need to be high level  Avoid technical terms  Talking in terms of loss to the business – operational risk and how it can be prevented  May have to explain to management what (all) runs on IBM i  Again… in business terms
  • 37. Operational Risk  Operational risk is caused by inadequate or failed internal processes or controls and results in loss (e.g., time, reputation, money)  Example:  We have data on one of our key servers – IBM i – that is vulnerable to being infected with ransomware and I would like to take steps to reduce that operational risk
  • 38. Don’t get Overwhelmed! With management, develop a plan to address vulnerabilities Do something! Take a step – ANY step to reduce your organization’s risk
  • 39. For More Information RCAC Redpiece  http://www.redbooks.ibm.com/abstracts/redp5110.html?Open Intrusion Detection  https://www.ibm.com/support/knowledgecenter/ssw_ibm_i_74/rzaub/rzau bpdf.pdf?view=kc IBM i Security Reference – PDF https://www.ibm.com/support/knowledgecenter/ssw_ibm_i_74/rzarl/sc415302. pdf?view=kc  Chapters 2 and 3 – System Values  Chapter 9 - Auditing  Chapter 10 – Authority Collection IBM i Security Administration and Compliance, 3nd edition, by Carol Woodbury, 2020. DXR Security www.dxrsecurity.com 42
  • 41. Assure Security 44 Compliance Monitoring • Assure Monitoring and Reporting • SIEM Integration • Assure Db2 Data Monitor Access Control • Assure MFA • Assure Elevated Authority Manager • Assure System Access Manager Data Privacy • Assure Encryption • Assure Secure File Transfer Malware Prevention • Assure MFA • Assure Elevated Authority Manager • Assure System Access Manager • Assure Monitoring and Reporting with SIEM Integration • Assure Encryption