SlideShare a Scribd company logo
1 of 16
Download to read offline
www.skyviewpartners.com




                                                      Carol Woodbury
                                                              @carolwoodbury
                                                     President and Co-Founder
                                                       SkyView Partners, Inc
                                                     www.skyviewpartners.com




                                                                                                    www.skyviewpartners.com   1




                                                                    © SkyView Partners, Inc, 2012
                                                                        All Rights Reserved.        www.skyviewpartners.com   2




@SkyView Partners, Inc, 2012. All Rights Reserved.                                                                                1
www.skyviewpartners.com




                                   Be pro-active
                                   Areas that are often out of compliance
                                    ◦ Automation opportunities
                                   Items requiring regular review
                                   Preparing for the next audit




                                                                 (c) SkyView Partners, Inc.,
                                                                 2012. All Rights Reserved             www.skyviewpartners.com   3




                                                                                                     Be Pro-active




                                                                     © SkyView Partners, Inc, 2012
                                                                         All Rights Reserved.          www.skyviewpartners.com   4




@SkyView Partners, Inc, 2012. All Rights Reserved.                                                                                   2
www.skyviewpartners.com




                                   Read the business page of national and local newspapers
                                   Read publications from your organization’s vertical industry
                                   Listen to webcasts, read magazines, online forums,
                                    newsletters and articles for i5/OS-specific information
                                    ◦ SkyView Partners has regular webinars
                                       http://www.skyviewpartners.com/lawsandregs.php
                                    ◦ Examples:
                                         PCI Data Security Standards
                                         EU Data Privacy Laws
                                         SOX
                                         J-SOX
                                         BASEL III
                                         Privacy Laws: Korea, PIPEDA, The Companies Bill


                                                                         (c) SkyView Partners, Inc.,
                                                                         2012. All Rights Reserved     www.skyviewpartners.com   5




                                   Implement security best practices wherever possible
                                   Document the areas where best practices isn’t
                                    possible
                                   Engage your development group




                                                                         (c) SkyView Partners, Inc.,
                                                                         2012. All Rights Reserved     www.skyviewpartners.com   6




@SkyView Partners, Inc, 2012. All Rights Reserved.                                                                                   3
www.skyviewpartners.com




                                   Start with an assessment
                                   Prioritize the list of issues
                                   Document your plans for remediation




                                                                             (c) SkyView Partners, Inc.,
                                                                             2012. All Rights Reserved     www.skyviewpartners.com   7




                                   Security standard
                                    ◦ BS7799 -> ISO17799 -> ISO/IEC27001:2005
                                       www.iso.org
                                   CobiT
                                    ◦ Process for analyzing risk in IT
                                       www.isaca.org
                                   Payment Card Industry
                                    ◦ Data Security Standards
                                       http://www.skyviewpartners.com/java-skyviewp/visa.jsp
                                   IBM i and i5/OS:
                                    ◦ IBM i Security Administration and Compliance by Carol Woodbury, 2012, available
                                      from www.amazon.com or MCPress Store

                                    ◦ iSeries Security Reference manual
                                    ◦ www.skyviewpartners.com




                                                                             (c) SkyView Partners, Inc.,
                                                                             2012. All Rights Reserved     www.skyviewpartners.com




@SkyView Partners, Inc, 2012. All Rights Reserved.                                                                                       4
www.skyviewpartners.com




                                                                   (c) SkyView Partners, Inc., 2012.
                                                                          All Rights Reserved          www.skyviewpartners.com   9




                                                     Areas that are Often Out of Compliance –
                                                                    Automation Opportunities




                                                                                                       www.skyviewpartners.com




@SkyView Partners, Inc, 2012. All Rights Reserved.                                                                                   5
www.skyviewpartners.com




                                   May be changed to enable a function and never set
                                    back.
                                   Vendors may modify a value when installing their
                                    product.




                                                                   (c) SkyView Partners, Inc.,
                                                                   2012. All Rights Reserved     www.skyviewpartners.com




                                   Default passwords
                                   Inactive users
                                   Special authority assignment
                                   Group membership




                                                                   (c) SkyView Partners, Inc.,
                                                                   2012. All Rights Reserved     www.skyviewpartners.com




@SkyView Partners, Inc, 2012. All Rights Reserved.                                                                         6
www.skyviewpartners.com




                                   ANZDFTPWD – Analyze default passwords
                                   Change the CRTUSRPRF command default as well as your user
                                    profile creation process so that profiles are never created
                                    with a default password.




                                                                                (c) SkyView Partners, Inc.,
                                                                                2012. All Rights Reserved     www.skyviewpartners.com




                                Step 1 - Set profiles to Status *DISABLED
                                   In V7R1, use the profile expiration attribute on CRT/CHGUSRPRF
                                   Use IBM SECTOOLS
                                        2. Display active profile list (list of omitted profiles)
                                        3. Change active profile list (to omit profiles from being set to Status *DISABLED)
                                        4. Analyze profile activity (scheduled job runs daily to set profiles to *DISABLED.
                                         Sends message to message queue of user running the menu option.)
                                   Write your own –
                                    ◦ key is to look at the right dates -
                                        Last used (vs Last sign on)
                                        Creation
                                        Restore
                                    ◦ DSPUSRPRF USRPRF(*ALL) OUTPUT(*OUTFILE) OUTFILE(CJW/ALLUSERS)
                                       and join with
                                       DSPOBJD OBJ(*ALL) OBJTYPE(*USRPRF) OUTPUT(*OUTFILE) OUTFILE(CJW/ALLUSERS2)
                                   Use a vendor product such as SkyView Policy Minder
                                   Note: If you perform a roll-swap, need to stop the automatic disabling of profiles.

                                Step 2 – Delete profiles
                                   Must be done manually (i5/OS provides no automatic delete)


                                                                                (c) SkyView Partners, Inc.,
                                                                                2012. All Rights Reserved     www.skyviewpartners.com




@SkyView Partners, Inc, 2012. All Rights Reserved.                                                                                      7
www.skyviewpartners.com




                                   Profiles are typically copied.
                                   Recommend:
                                    ◦ Developing role-based access implemented via group profiles
                                    ◦ Copy a template rather than another user’s profile




                                                                       (c) SkyView Partners, Inc.,
                                                                       2012. All Rights Reserved              www.skyviewpartners.com




                                   Recommend that group membership be reviewed at
                                    least annually

                                   DSPUSRPRF USRPRF(SUPERGROUP) TYPE(*GRPMBR) OUTPUT(*PRINT)

                                   DSPAUTUSR SEQ(*GRPPRF) OUTPUT(*PRINT)




                                                                      (c) SkyView Partners, Inc., 2012. All
                                                                                Rights Reserved               www.skyviewpartners.com   16




@SkyView Partners, Inc, 2012. All Rights Reserved.                                                                                           8
www.skyviewpartners.com




                                Access to files containing private data or programs performing
                                  critical actions such as de-crypting need to be reviewed for
                                  appropriate:
                                 Default access (*PUBLIC authority)
                                 Additional private authorities

                                 Authorization list assignment
                                 Ownership
                                 Adopted authority settings (programs / service programs)




                                                                       (c) SkyView Partners, Inc.,
                                                                       2012. All Rights Reserved     www.skyviewpartners.com




                                Critical files in libraries
                                 Authority to files containing:
                                  ◦   Card holder data
                                  ◦   HR information
                                  ◦   HIPAA data
                                  ◦   Confidential data belonging to your organization

                                and in the IFS
                                 Authority to directories and files containing:
                                  ◦ Payroll information
                                  ◦ Credit card transactions

                                and don’t forget to review authorization lists


                                                                       (c) SkyView Partners, Inc.,
                                                                       2012. All Rights Reserved     www.skyviewpartners.com




@SkyView Partners, Inc, 2012. All Rights Reserved.                                                                             9
www.skyviewpartners.com




                                   Review authorities - *PUBLIC and private – are they
                                    appropriate?
                                    ◦ Use DSPAUTL AUTL(autl_name) OUTPUT(*PRINT) or
                                    ◦ DSPAUTL AUTL(autl_name) OUTPUT(*OUTFILE)

                                   Review objects secured by the authorization list
                                    ◦ Use DSPAUTLOBJ AUTL(autl_name) OUTPUT(*PRINT) or
                                    ◦ DSPAUTLOBJ AUTL(autl_name) OUTPUT(*OUTFILE)
                                    ◦ (Note: Prior to V6R1, DSPAUTLOBJ locks all of the objects secured by
                                      the authorization list. It’s best to run this command when users are not
                                      attempting to run the application.)




                                                                        (c) SkyView Partners, Inc.,
                                                                        2012. All Rights Reserved           www.skyviewpartners.com




                                                              Prepare to Review these Annually




                                                                            © SkyView Partners, Inc, 2012
                                                                                All Rights Reserved.        www.skyviewpartners.com   20




@SkyView Partners, Inc, 2012. All Rights Reserved.                                                                                         10
www.skyviewpartners.com




                                Review annually to ensure it addresses:
                                 New technology

                                 Mergers and acquisitions

                                 Requirements from new laws or regs




                                                              (c) SkyView Partners, Inc.,
                                                              2012. All Rights Reserved     www.skyviewpartners.com   21




                                Typical thought is – it’s not going to happen to us –
                                   therefore – no plan is in place. 
                                If a plan is in place, it needs to be reviewed to ensure:
                                 New threats are accounted for

                                 New incident techniques are documented

                                 Contacts are updated


                              -> Consider a retainer with a company that specializes in
                              investigating incidents


                                                              (c) SkyView Partners, Inc.,
                                                              2012. All Rights Reserved     www.skyviewpartners.com   22




@SkyView Partners, Inc, 2012. All Rights Reserved.                                                                         11
www.skyviewpartners.com




                                Program needs to be reviewed to ensure:
                                 Employee policy issues are communicated

                                 Awareness is raised about new threats

                                 Requirements from new laws and regs are
                                  communicated




                                                                 (c) SkyView Partners, Inc.,
                                                                 2012. All Rights Reserved     www.skyviewpartners.com   23




                                   Verify documentation follows the what is actually done
                                    ◦ Worse to have an inaccurate document than no document at
                                      all
                                   Get rid of documentation for processes that are no
                                    longer followed
                                   Ensure appropriate processes are documented




                                                                 (c) SkyView Partners, Inc.,
                                                                 2012. All Rights Reserved     www.skyviewpartners.com   24




@SkyView Partners, Inc, 2012. All Rights Reserved.                                                                            12
www.skyviewpartners.com




                                   Encryption keys
                                    ◦ Who has responsibility for managing keys?
                                       What happens if they leave the company?
                                    ◦ Do you have a process in place for a) regularly changing keys
                                      b) changing keys on an emergency basis?
                                   Is all data encrypted that should be encrypted?
                                    ◦ Backups (get out of notification requirement of many state
                                      breach notification laws)
                                    ◦ Private data (California breach now includes healthcare)
                                    ◦ On PCs – Massachusetts requires private data on mobile
                                      devices to be encrypted

                                                                    (c) SkyView Partners, Inc.,
                                                                    2012. All Rights Reserved           www.skyviewpartners.com




                                                                    Prepare for the Next Audit




                                                                        © SkyView Partners, Inc, 2012
                                                                            All Rights Reserved.        www.skyviewpartners.com   26




@SkyView Partners, Inc, 2012. All Rights Reserved.                                                                                     13
www.skyviewpartners.com




                                   Arrival won’t be as frantic if systems are perpetually in
                                    compliance.
                                   Be prepared for their arrival by
                                    ◦ Updating policies and procedures
                                       Document exceptions!
                                    ◦ Have work plans ready for known issues not yet addressed
                                    ◦ Keeping records proving that you’ve been checking
                                      compliance
                                    ◦ Providing the information they’ve requested prior to the audit
                                    ◦ Addressing previous audit findings


                                                                     (c) SkyView Partners, Inc.,
                                                                     2012. All Rights Reserved     www.skyviewpartners.com




                                   What changes did you have to make?
                                    ◦ System values
                                    ◦ User profile settings
                                       Reduce special authorities
                                       Remove inactive profiles
                                    ◦ Authorities
                                       Database files
                                       IFS directories




                                                                     (c) SkyView Partners, Inc.,
                                                                     2012. All Rights Reserved     www.skyviewpartners.com   28




@SkyView Partners, Inc, 2012. All Rights Reserved.                                                                                14
www.skyviewpartners.com




                                   What reports did you have to generate?
                                    ◦ System values
                                    ◦ User profile settings
                                    ◦ Authorities




                                                              (c) SkyView Partners, Inc.,
                                                              2012. All Rights Reserved     www.skyviewpartners.com   29




                                   How can you automate these activities?



                                Benefits:
                                 Stop putting so much effort prior to an audit

                                 Perpetual compliance

                                 Potential for being more secure




                                                              (c) SkyView Partners, Inc.,
                                                              2012. All Rights Reserved     www.skyviewpartners.com   30




@SkyView Partners, Inc, 2012. All Rights Reserved.                                                                         15
www.skyviewpartners.com




                                                                                           It’s a lifestyle


                                                                 (c) SkyView Partners, Inc., 2012.
                                                                        All Rights Reserved          www.skyviewpartners.com




                                 SkyView Partners – provider of security administration and compliance
                                                     software, services and solutions

                                                      www.skyviewpartners.com

                                                             Reach us at:
                                                      info@skyviewpartners.com




                                                                      (c) SkyView Partners, Inc.,
                                                                      2012. All Rights Reserved      www.skyviewpartners.com




@SkyView Partners, Inc, 2012. All Rights Reserved.                                                                             16

More Related Content

Similar to Attaining and maintaining compliance europe

Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...Thanos TP
 
Webinar Demand Creation for Content Marketers: From Start to Finish
Webinar Demand Creation for Content Marketers: From Start to FinishWebinar Demand Creation for Content Marketers: From Start to Finish
Webinar Demand Creation for Content Marketers: From Start to FinishContent Marketing World
 
"What If" Analysis: How to Develop Corporate Muscle Memory with IBP
"What If" Analysis: How to Develop Corporate Muscle Memory with IBP"What If" Analysis: How to Develop Corporate Muscle Memory with IBP
"What If" Analysis: How to Develop Corporate Muscle Memory with IBPSteelwedge
 
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...AWS User Group - Thailand
 
Who says Elephant Can't Dance?
Who says Elephant Can't Dance?Who says Elephant Can't Dance?
Who says Elephant Can't Dance?Anand Sharma
 
Redefining Perspectives 6 - Session 1 Jarlath Forde
Redefining Perspectives 6 - Session 1 Jarlath FordeRedefining Perspectives 6 - Session 1 Jarlath Forde
Redefining Perspectives 6 - Session 1 Jarlath Fordesapientindia
 
Skyword webinar revving up content strategies 3 7 2013 ll
Skyword webinar revving up content strategies 3 7 2013 llSkyword webinar revving up content strategies 3 7 2013 ll
Skyword webinar revving up content strategies 3 7 2013 llLynne Leonardi
 
Do Security Like a Start Up or Get Fired
Do Security Like a Start Up or Get FiredDo Security Like a Start Up or Get Fired
Do Security Like a Start Up or Get FiredNetIQ
 
Getting Online - OYL
Getting Online - OYLGetting Online - OYL
Getting Online - OYLmikulshah
 
apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...
apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...
apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...apidays
 
Mis tue sponsored lunch adobe
Mis tue sponsored lunch   adobeMis tue sponsored lunch   adobe
Mis tue sponsored lunch adobeMediaPost
 
Responsive Web Design in Oracle Application Express
Responsive Web Design in Oracle Application ExpressResponsive Web Design in Oracle Application Express
Responsive Web Design in Oracle Application ExpressShakeeb Rahman
 
CREATIVEHOPE, INC. Corporate Overview
CREATIVEHOPE, INC. Corporate OverviewCREATIVEHOPE, INC. Corporate Overview
CREATIVEHOPE, INC. Corporate OverviewCREATIVEHOPE
 
Introduction to primavera risk analysis ppt
Introduction to primavera risk analysis pptIntroduction to primavera risk analysis ppt
Introduction to primavera risk analysis pptp6academy
 
Setting Up Your Mobile Testing Factory for 2013
Setting Up Your Mobile Testing Factory for 2013Setting Up Your Mobile Testing Factory for 2013
Setting Up Your Mobile Testing Factory for 2013SOASTA
 
Prepare Your DevOps Culture to Withstand the Digital Experience Onslaught
Prepare Your DevOps Culture to Withstand the Digital Experience OnslaughtPrepare Your DevOps Culture to Withstand the Digital Experience Onslaught
Prepare Your DevOps Culture to Withstand the Digital Experience OnslaughtDevOps.com
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013David Linthicum
 

Similar to Attaining and maintaining compliance europe (20)

Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
Partner Webcast – Oracle Public Cloud for ISVs: Migrating Java EE and ADF app...
 
Webinar Demand Creation for Content Marketers: From Start to Finish
Webinar Demand Creation for Content Marketers: From Start to FinishWebinar Demand Creation for Content Marketers: From Start to Finish
Webinar Demand Creation for Content Marketers: From Start to Finish
 
"What If" Analysis: How to Develop Corporate Muscle Memory with IBP
"What If" Analysis: How to Develop Corporate Muscle Memory with IBP"What If" Analysis: How to Develop Corporate Muscle Memory with IBP
"What If" Analysis: How to Develop Corporate Muscle Memory with IBP
 
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
AWS Meetup: Career Day 2019 - Lightning Talk with Cloud Career Path: DevOps E...
 
Who says Elephant Can't Dance?
Who says Elephant Can't Dance?Who says Elephant Can't Dance?
Who says Elephant Can't Dance?
 
Redefining Perspectives 6 - Session 1 Jarlath Forde
Redefining Perspectives 6 - Session 1 Jarlath FordeRedefining Perspectives 6 - Session 1 Jarlath Forde
Redefining Perspectives 6 - Session 1 Jarlath Forde
 
Skyword webinar revving up content strategies 3 7 2013 ll
Skyword webinar revving up content strategies 3 7 2013 llSkyword webinar revving up content strategies 3 7 2013 ll
Skyword webinar revving up content strategies 3 7 2013 ll
 
Do Security Like a Start Up or Get Fired
Do Security Like a Start Up or Get FiredDo Security Like a Start Up or Get Fired
Do Security Like a Start Up or Get Fired
 
Getting Online - OYL
Getting Online - OYLGetting Online - OYL
Getting Online - OYL
 
apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...
apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...
apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...
 
PCI and the Cloud
PCI and the CloudPCI and the Cloud
PCI and the Cloud
 
Mis tue sponsored lunch adobe
Mis tue sponsored lunch   adobeMis tue sponsored lunch   adobe
Mis tue sponsored lunch adobe
 
Responsive Web Design in Oracle Application Express
Responsive Web Design in Oracle Application ExpressResponsive Web Design in Oracle Application Express
Responsive Web Design in Oracle Application Express
 
CREATIVEHOPE, INC. Corporate Overview
CREATIVEHOPE, INC. Corporate OverviewCREATIVEHOPE, INC. Corporate Overview
CREATIVEHOPE, INC. Corporate Overview
 
Introduction to primavera risk analysis ppt
Introduction to primavera risk analysis pptIntroduction to primavera risk analysis ppt
Introduction to primavera risk analysis ppt
 
The DevOps Imperative
The DevOps ImperativeThe DevOps Imperative
The DevOps Imperative
 
Setting Up Your Mobile Testing Factory for 2013
Setting Up Your Mobile Testing Factory for 2013Setting Up Your Mobile Testing Factory for 2013
Setting Up Your Mobile Testing Factory for 2013
 
Prepare Your DevOps Culture to Withstand the Digital Experience Onslaught
Prepare Your DevOps Culture to Withstand the Digital Experience OnslaughtPrepare Your DevOps Culture to Withstand the Digital Experience Onslaught
Prepare Your DevOps Culture to Withstand the Digital Experience Onslaught
 
Nubefy
NubefyNubefy
Nubefy
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013
 

More from COMMON Europe

What's New in WebSphere Application Server
What's New in WebSphere Application ServerWhat's New in WebSphere Application Server
What's New in WebSphere Application ServerCOMMON Europe
 
Compiling the Compiler
Compiling the CompilerCompiling the Compiler
Compiling the CompilerCOMMON Europe
 
Why i - Common Europe 2012
Why i - Common Europe 2012Why i - Common Europe 2012
Why i - Common Europe 2012COMMON Europe
 
The Ruby OpenSSL extension
The Ruby OpenSSL extensionThe Ruby OpenSSL extension
The Ruby OpenSSL extensionCOMMON Europe
 
Using Ruby on IBM i (i5/OS)
Using Ruby on IBM i (i5/OS)Using Ruby on IBM i (i5/OS)
Using Ruby on IBM i (i5/OS)COMMON Europe
 
IBM Systems Director Navigator for i
IBM Systems Director Navigator for iIBM Systems Director Navigator for i
IBM Systems Director Navigator for iCOMMON Europe
 
IBM i Trends & Directions Common Europe 2012
IBM i Trends & Directions Common Europe 2012IBM i Trends & Directions Common Europe 2012
IBM i Trends & Directions Common Europe 2012COMMON Europe
 
IBM i Technology Refreshes Overview 2012 06-04
IBM i Technology Refreshes Overview 2012 06-04IBM i Technology Refreshes Overview 2012 06-04
IBM i Technology Refreshes Overview 2012 06-04COMMON Europe
 
IBM i 7.1 & TRs CEC 2012
IBM i 7.1 & TRs CEC 2012IBM i 7.1 & TRs CEC 2012
IBM i 7.1 & TRs CEC 2012COMMON Europe
 
DB2 Web Query whats new
DB2 Web Query whats newDB2 Web Query whats new
DB2 Web Query whats newCOMMON Europe
 
Access client solutions overview
Access client solutions overviewAccess client solutions overview
Access client solutions overviewCOMMON Europe
 
What's new with Zend server
What's new with Zend serverWhat's new with Zend server
What's new with Zend serverCOMMON Europe
 
Php arrays for RPG programmers
Php arrays for RPG programmersPhp arrays for RPG programmers
Php arrays for RPG programmersCOMMON Europe
 
Open source report writing tools for IBM i Vienna 2012
Open source report writing tools for IBM i  Vienna 2012Open source report writing tools for IBM i  Vienna 2012
Open source report writing tools for IBM i Vienna 2012COMMON Europe
 
Moving 5.4 to 7.1 AB
Moving 5.4 to 7.1 ABMoving 5.4 to 7.1 AB
Moving 5.4 to 7.1 ABCOMMON Europe
 
Introduction to My SQL
Introduction to My SQLIntroduction to My SQL
Introduction to My SQLCOMMON Europe
 
IBM CEC 2012 Storage june 11, 2012
IBM CEC 2012 Storage june 11, 2012IBM CEC 2012 Storage june 11, 2012
IBM CEC 2012 Storage june 11, 2012COMMON Europe
 
Getting started with PHP on IBM i
Getting started with PHP on IBM iGetting started with PHP on IBM i
Getting started with PHP on IBM iCOMMON Europe
 
Developing mobile applications for i using open source tools Venna 2012
Developing mobile applications for i using open source tools  Venna 2012Developing mobile applications for i using open source tools  Venna 2012
Developing mobile applications for i using open source tools Venna 2012COMMON Europe
 

More from COMMON Europe (20)

What's New in WebSphere Application Server
What's New in WebSphere Application ServerWhat's New in WebSphere Application Server
What's New in WebSphere Application Server
 
Compiling the Compiler
Compiling the CompilerCompiling the Compiler
Compiling the Compiler
 
Why i - Common Europe 2012
Why i - Common Europe 2012Why i - Common Europe 2012
Why i - Common Europe 2012
 
The Ruby OpenSSL extension
The Ruby OpenSSL extensionThe Ruby OpenSSL extension
The Ruby OpenSSL extension
 
Using Ruby on IBM i (i5/OS)
Using Ruby on IBM i (i5/OS)Using Ruby on IBM i (i5/OS)
Using Ruby on IBM i (i5/OS)
 
IBM Systems Director Navigator for i
IBM Systems Director Navigator for iIBM Systems Director Navigator for i
IBM Systems Director Navigator for i
 
IBM i Trends & Directions Common Europe 2012
IBM i Trends & Directions Common Europe 2012IBM i Trends & Directions Common Europe 2012
IBM i Trends & Directions Common Europe 2012
 
IBM i Technology Refreshes Overview 2012 06-04
IBM i Technology Refreshes Overview 2012 06-04IBM i Technology Refreshes Overview 2012 06-04
IBM i Technology Refreshes Overview 2012 06-04
 
IBM i 7.1 & TRs CEC 2012
IBM i 7.1 & TRs CEC 2012IBM i 7.1 & TRs CEC 2012
IBM i 7.1 & TRs CEC 2012
 
DB2 Web Query whats new
DB2 Web Query whats newDB2 Web Query whats new
DB2 Web Query whats new
 
Access client solutions overview
Access client solutions overviewAccess client solutions overview
Access client solutions overview
 
What's new with Zend server
What's new with Zend serverWhat's new with Zend server
What's new with Zend server
 
RPG investment
RPG investmentRPG investment
RPG investment
 
Php arrays for RPG programmers
Php arrays for RPG programmersPhp arrays for RPG programmers
Php arrays for RPG programmers
 
Open source report writing tools for IBM i Vienna 2012
Open source report writing tools for IBM i  Vienna 2012Open source report writing tools for IBM i  Vienna 2012
Open source report writing tools for IBM i Vienna 2012
 
Moving 5.4 to 7.1 AB
Moving 5.4 to 7.1 ABMoving 5.4 to 7.1 AB
Moving 5.4 to 7.1 AB
 
Introduction to My SQL
Introduction to My SQLIntroduction to My SQL
Introduction to My SQL
 
IBM CEC 2012 Storage june 11, 2012
IBM CEC 2012 Storage june 11, 2012IBM CEC 2012 Storage june 11, 2012
IBM CEC 2012 Storage june 11, 2012
 
Getting started with PHP on IBM i
Getting started with PHP on IBM iGetting started with PHP on IBM i
Getting started with PHP on IBM i
 
Developing mobile applications for i using open source tools Venna 2012
Developing mobile applications for i using open source tools  Venna 2012Developing mobile applications for i using open source tools  Venna 2012
Developing mobile applications for i using open source tools Venna 2012
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Attaining and maintaining compliance europe

  • 1. www.skyviewpartners.com Carol Woodbury @carolwoodbury President and Co-Founder SkyView Partners, Inc www.skyviewpartners.com www.skyviewpartners.com 1 © SkyView Partners, Inc, 2012 All Rights Reserved. www.skyviewpartners.com 2 @SkyView Partners, Inc, 2012. All Rights Reserved. 1
  • 2. www.skyviewpartners.com  Be pro-active  Areas that are often out of compliance ◦ Automation opportunities  Items requiring regular review  Preparing for the next audit (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com 3 Be Pro-active © SkyView Partners, Inc, 2012 All Rights Reserved. www.skyviewpartners.com 4 @SkyView Partners, Inc, 2012. All Rights Reserved. 2
  • 3. www.skyviewpartners.com  Read the business page of national and local newspapers  Read publications from your organization’s vertical industry  Listen to webcasts, read magazines, online forums, newsletters and articles for i5/OS-specific information ◦ SkyView Partners has regular webinars  http://www.skyviewpartners.com/lawsandregs.php ◦ Examples:  PCI Data Security Standards  EU Data Privacy Laws  SOX  J-SOX  BASEL III  Privacy Laws: Korea, PIPEDA, The Companies Bill (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com 5  Implement security best practices wherever possible  Document the areas where best practices isn’t possible  Engage your development group (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com 6 @SkyView Partners, Inc, 2012. All Rights Reserved. 3
  • 4. www.skyviewpartners.com  Start with an assessment  Prioritize the list of issues  Document your plans for remediation (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com 7  Security standard ◦ BS7799 -> ISO17799 -> ISO/IEC27001:2005  www.iso.org  CobiT ◦ Process for analyzing risk in IT  www.isaca.org  Payment Card Industry ◦ Data Security Standards  http://www.skyviewpartners.com/java-skyviewp/visa.jsp  IBM i and i5/OS: ◦ IBM i Security Administration and Compliance by Carol Woodbury, 2012, available from www.amazon.com or MCPress Store ◦ iSeries Security Reference manual ◦ www.skyviewpartners.com (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com @SkyView Partners, Inc, 2012. All Rights Reserved. 4
  • 5. www.skyviewpartners.com (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com 9 Areas that are Often Out of Compliance – Automation Opportunities www.skyviewpartners.com @SkyView Partners, Inc, 2012. All Rights Reserved. 5
  • 6. www.skyviewpartners.com  May be changed to enable a function and never set back.  Vendors may modify a value when installing their product. (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com  Default passwords  Inactive users  Special authority assignment  Group membership (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com @SkyView Partners, Inc, 2012. All Rights Reserved. 6
  • 7. www.skyviewpartners.com  ANZDFTPWD – Analyze default passwords  Change the CRTUSRPRF command default as well as your user profile creation process so that profiles are never created with a default password. (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com Step 1 - Set profiles to Status *DISABLED  In V7R1, use the profile expiration attribute on CRT/CHGUSRPRF  Use IBM SECTOOLS  2. Display active profile list (list of omitted profiles)  3. Change active profile list (to omit profiles from being set to Status *DISABLED)  4. Analyze profile activity (scheduled job runs daily to set profiles to *DISABLED. Sends message to message queue of user running the menu option.)  Write your own – ◦ key is to look at the right dates -  Last used (vs Last sign on)  Creation  Restore ◦ DSPUSRPRF USRPRF(*ALL) OUTPUT(*OUTFILE) OUTFILE(CJW/ALLUSERS) and join with DSPOBJD OBJ(*ALL) OBJTYPE(*USRPRF) OUTPUT(*OUTFILE) OUTFILE(CJW/ALLUSERS2)  Use a vendor product such as SkyView Policy Minder  Note: If you perform a roll-swap, need to stop the automatic disabling of profiles. Step 2 – Delete profiles  Must be done manually (i5/OS provides no automatic delete) (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com @SkyView Partners, Inc, 2012. All Rights Reserved. 7
  • 8. www.skyviewpartners.com  Profiles are typically copied.  Recommend: ◦ Developing role-based access implemented via group profiles ◦ Copy a template rather than another user’s profile (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com  Recommend that group membership be reviewed at least annually  DSPUSRPRF USRPRF(SUPERGROUP) TYPE(*GRPMBR) OUTPUT(*PRINT)  DSPAUTUSR SEQ(*GRPPRF) OUTPUT(*PRINT) (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com 16 @SkyView Partners, Inc, 2012. All Rights Reserved. 8
  • 9. www.skyviewpartners.com Access to files containing private data or programs performing critical actions such as de-crypting need to be reviewed for appropriate:  Default access (*PUBLIC authority)  Additional private authorities  Authorization list assignment  Ownership  Adopted authority settings (programs / service programs) (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com Critical files in libraries  Authority to files containing: ◦ Card holder data ◦ HR information ◦ HIPAA data ◦ Confidential data belonging to your organization and in the IFS  Authority to directories and files containing: ◦ Payroll information ◦ Credit card transactions and don’t forget to review authorization lists (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com @SkyView Partners, Inc, 2012. All Rights Reserved. 9
  • 10. www.skyviewpartners.com  Review authorities - *PUBLIC and private – are they appropriate? ◦ Use DSPAUTL AUTL(autl_name) OUTPUT(*PRINT) or ◦ DSPAUTL AUTL(autl_name) OUTPUT(*OUTFILE)  Review objects secured by the authorization list ◦ Use DSPAUTLOBJ AUTL(autl_name) OUTPUT(*PRINT) or ◦ DSPAUTLOBJ AUTL(autl_name) OUTPUT(*OUTFILE) ◦ (Note: Prior to V6R1, DSPAUTLOBJ locks all of the objects secured by the authorization list. It’s best to run this command when users are not attempting to run the application.) (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com Prepare to Review these Annually © SkyView Partners, Inc, 2012 All Rights Reserved. www.skyviewpartners.com 20 @SkyView Partners, Inc, 2012. All Rights Reserved. 10
  • 11. www.skyviewpartners.com Review annually to ensure it addresses:  New technology  Mergers and acquisitions  Requirements from new laws or regs (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com 21 Typical thought is – it’s not going to happen to us – therefore – no plan is in place.  If a plan is in place, it needs to be reviewed to ensure:  New threats are accounted for  New incident techniques are documented  Contacts are updated -> Consider a retainer with a company that specializes in investigating incidents (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com 22 @SkyView Partners, Inc, 2012. All Rights Reserved. 11
  • 12. www.skyviewpartners.com Program needs to be reviewed to ensure:  Employee policy issues are communicated  Awareness is raised about new threats  Requirements from new laws and regs are communicated (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com 23  Verify documentation follows the what is actually done ◦ Worse to have an inaccurate document than no document at all  Get rid of documentation for processes that are no longer followed  Ensure appropriate processes are documented (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com 24 @SkyView Partners, Inc, 2012. All Rights Reserved. 12
  • 13. www.skyviewpartners.com  Encryption keys ◦ Who has responsibility for managing keys?  What happens if they leave the company? ◦ Do you have a process in place for a) regularly changing keys b) changing keys on an emergency basis?  Is all data encrypted that should be encrypted? ◦ Backups (get out of notification requirement of many state breach notification laws) ◦ Private data (California breach now includes healthcare) ◦ On PCs – Massachusetts requires private data on mobile devices to be encrypted (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com Prepare for the Next Audit © SkyView Partners, Inc, 2012 All Rights Reserved. www.skyviewpartners.com 26 @SkyView Partners, Inc, 2012. All Rights Reserved. 13
  • 14. www.skyviewpartners.com  Arrival won’t be as frantic if systems are perpetually in compliance.  Be prepared for their arrival by ◦ Updating policies and procedures  Document exceptions! ◦ Have work plans ready for known issues not yet addressed ◦ Keeping records proving that you’ve been checking compliance ◦ Providing the information they’ve requested prior to the audit ◦ Addressing previous audit findings (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com  What changes did you have to make? ◦ System values ◦ User profile settings  Reduce special authorities  Remove inactive profiles ◦ Authorities  Database files  IFS directories (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com 28 @SkyView Partners, Inc, 2012. All Rights Reserved. 14
  • 15. www.skyviewpartners.com  What reports did you have to generate? ◦ System values ◦ User profile settings ◦ Authorities (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com 29  How can you automate these activities? Benefits:  Stop putting so much effort prior to an audit  Perpetual compliance  Potential for being more secure (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com 30 @SkyView Partners, Inc, 2012. All Rights Reserved. 15
  • 16. www.skyviewpartners.com It’s a lifestyle (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com SkyView Partners – provider of security administration and compliance software, services and solutions www.skyviewpartners.com Reach us at: info@skyviewpartners.com (c) SkyView Partners, Inc., 2012. All Rights Reserved www.skyviewpartners.com @SkyView Partners, Inc, 2012. All Rights Reserved. 16