SlideShare a Scribd company logo
2013 State of IBM i Security Study
Presented by PowerTech,
A Division of Help/Systems
2013 State of IBM i Security Study
p. 2
The PowerTech Group
www.powertech.com • info@powertech.com
INTRODUCTION
A breach like this might seem farfetched in the real world—where Power Systems™ servers
running IBM i maintain a solid reputation for impenetrable security. But the data from the
2013 State of IBM i Security Study proves these internal threats more possible than not.
The face of the cybercriminal is changing and any number of improper security controls—
allowing default passwords, not limiting sign on attempts, keeping inactive profiles—could
make their breach attempts successful.
While IBM i is one of the most securable servers, the prevailing use of incorrect or lax
configuration settings leaves it vulnerable to threats.
Even if you would personally vouch for the integrity of your staff, remember that SOX, PCI,
and other regulatory compliance auditors aren’t asking, “Would they?” or “Might they?”
but “Do they have the ability to?”
The annual State of IBM i Security study strives to help executives, IT managers, system
admins, and auditors understand the important IBM i security exposures and compliance
violations and how to correct them in the most efficient and economical way.
A star employee sits in her office, curled over her keyboard. It’s after 5,
but she’s still here. Coworkers assume a promotion is in the works and
admire her loyalty, but she’s got different motives.
She types a few characters and hits enter. No luck. Undeterred, she tries
a different combination of letters. Nothing…yet. The question isn’t when
will she gain access to sensitive IBM i data, the question is—
Will the security team catch her in time?
2013 State of IBM i Security Study
p. 3
The PowerTech Group
www.powertech.com • info@powertech.com
WHY THIS STUDY IS IMPORTANT
This year marks the 25th birthday of the AS/400, as well as the 10th anniversary
of the State of IBM i Security Study. From the AS/400 to iSeries, System i, and
finally Power Systems running IBM i, PowerTech has followed the evolution and
provided invaluable security insight from more than 1,700 servers worldwide.
The results from the 2013 study, and the universal nature of IBM i vulnerabilities,
lead us to conclude that if you have IBM i systems in your data center, your
organization might suffer from similar internal control deficiencies.
WHAT THIS STUDY MEANS FOR YOU
Your IBM i server likely runs your mission-critical business applications—and has
been for 20 years or more—but the staff that set up server security may be long gone.
To complicate things, the integrated nature of many IBM i security controls has caused confu-
sion over who is responsible for the configuration—IBM, the customer, or the application
provider. As such, many systems operate with default settings due to lack of ownership.
You know an IBM i audit is long overdue, but you’re too busy grappling with:
	 • Knowledge gaps
	 • Overextended staff
	 • Lean IT budgets
Too often, IBM i security projects take a back seat to Windows and UNIX platforms due to the
perception that IBM i is less vulnerable.
Consequently, as the threat landscape looms ever greater, the administration of IBM i security
controls has lapsed and guards are down.
Now here’s the good news: The weaknesses identified through our assessments and docu-
mented in this study are caused by poor or missing configurations that can—and should—be
corrected.
This study shows you the most common and dangerous IBM i security exposures; outlines how
to correct them; and explains how these relate to compliance legislation, industry regulations,
and IT guidelines and best practices.
“The weaknesses
identified in this
study are caused by
poor or missing
configurations that
can—and should—
be corrected.”
2013 State of IBM i Security Study
p. 4
The PowerTech Group
www.powertech.com • info@powertech.com
THE POWER SYSTEMS LANDSCAPE
IBM introduced the AS/400 in 1988 as its computing system for small- and medium-sized compa-
nies. Today, the Power Systems product line ranges from small servers with a single processor to
the Power 780 server, which can have up to sixteen POWER7+ processors with four cores each.
The IBM i community includes a large and loyal base throughout the world—with more than
380,000 systems estimated in production use. The PowerTech data was collected from a cross-
section of systems of varying sizes.
Companies in retail, financial, manufacturing, and distribution industries typically purchased
their Power Systems server as part of an integrated business system. Today more than 16,000
banks run their core banking and financial applications on an IBM i server.
Many retailers use financial applications that store credit card data on the system. Some of the
well-known software vendors that provide applications are:
	 • Oracle (JD Edwards ERP)
	 • Lawson/Intentia (Financials)
	 • FISERVE
	 • SAP
	 • IBM Domino
	 • IBM WebSphere
	 • Jack Henry (Core banking)
	 • INFOR (BPICS, MAPICS, Infinium, Infor ERP XA applications, PRISM)
	 • Manhattan Associates (Supply chain)
Given the mission-critical data stored on these systems, maintaining a secure configuration
should be a top priority.
METHODS
Using the Compliance Assessment™ (PowerTech proprietary software, which runs directly from
any network-attached PC without modifying IBM system settings), Power Systems running IBM
i (System i, iSeries, AS/400) are interrogated across six critical audit areas:
	 • Server-level security controls
	 • Profile and password settings
	 • Administrative capabilities
	 • Network-initiated commands & data access
	 • Public accessibility to corporate data
	 • System event auditing
2013 State of IBM i Security Study
p. 5
The PowerTech Group
www.powertech.com • info@powertech.com
After the analysis is complete, the anonymous security statistics are returned directly to one of
our servers. The software does not collect any application-specific data; therefore no informa-
tion is available regarding the purpose of the server. Participation in the study is optional.
For this year’s study, PowerTech reviewed data from 101 IBM i servers and partitions audited
between January and December of 2012. The organizations spanned a broad range of sizes
and industry verticals, including financial, healthcare, communications, education, and trans-
portation.
As in previous years, this is not a random sample. The security officers or other staff at these
companies were concerned enough about IBM i security to request an assessment. This may
have resulted in a sample that is either unusually security-conscious or, at the other extreme,
knowingly deficient. Our experience leads us to believe the latter is closer to the norm.
We conduct many more assessments than are included in the study as the recipient of an
assessment may opt out from sharing their details. This means we have greater—albeit
private—insight into the industry statistics than the study reveals. Everything we see reinforces
the study sample.
Lastly, this is not a recurring study of the same systems so direct year-to-year comparisons
cannot be made. However, some general trends are discussed.
The average system assessed for the 2013 study has 1,082 users and 427 libraries. These
numbers are a bit higher than the median because there were several large servers in the
data sample (Table 1).
TABLE 1: AVERAGE SYSTEM SIZE
	 System Size 	 Average	 Median
	 # of Users	 1,082	 499
	 # of Libraries	 427 	 325
All assessed servers are running on supported versions of the OS. Although IBM has declared
support will end in September 2013, 41% of the servers remain on V5R4 (Figure 1).
Another 41% are on V6R1 and the remaining 18% are running IBM’s latest: V7R1.
FIGURE 1: INSTALLED VERSIONS OF IBM i
V5R4M0 (41%)* V6R1M0 (41%) V7R1M0 (18%)
* IBM support for V5R4 ends on September 30, 2013. IBM recommends direct migration to V7R1.
2013 State of IBM i Security Study
p. 6
The PowerTech Group
www.powertech.com • info@powertech.com
SYSTEM SECURITY
IBM i security best practices start with the configuration of numerous system values. Although
often undermined by other settings, the system security level (QSECURTY) sets the overall
tone. Documented vulnerabilities in security level 30 and below led IBM to recommend and ship
level 40 as the minimum. Unfortunately, 37% of servers are operating below this level.
Power Systems servers can be configured at one of five different security levels:
	•	Level 10 - No Security. No password required. User IDs are created for any user who 		
		 attempts to sign on. IBM no longer supports level 10.
	•	Level 20 - Password Security. Every user must have a valid ID and password. Every user 	
		 with a valid ID and password assumes root-level authority by default.
	•	Level 30 - Resource Security. Object-level authority is enforced as users do not assume 	
		 root-level authority by default. A moderately knowledgeable programmer or operator 	
		 can bypass resource level security and assume root-level authority.
	•	Level 40 - Operating System Security. Level 30 protection plus operating system integrity. 	
		 It is possible for an extremely knowledgeable programmer with access to your system to 	
		 elevate his or her level of authority, possibly as high as root-level authority.
	•	Level 50 - Enhanced Operating System Security. Level 40 protection plus enhanced 		
		 operating system integrity. A properly secured system at security level 50 is the best 		
		 defense. However, even at level 50, other system configuration issues must be addressed.
Figure 2 shows the distribution of security settings on the systems. Out of the 101 systems in
the 2013 dataset, 37% are running system security level 30 or lower.
FIGURE 2: SYSTEM SECURITY LEVEL
NumberofSystems
System Value: QSECURITY
2013 State of IBM i Security Study
p. 7
The PowerTech Group
www.powertech.com • info@powertech.com
Several other system values related to object restoration often remain at their shipped levels,
confirming a typical IBM i configuration of “load and go.”
The following three system values work consecutively to determine if an object should be
restored, or if it is to be converted during the restore:
	•	Allow Object Restore (QALWOBJRST)—Only 2% of servers have altered this system 		
		 value from its default *ALL setting.
	 	 This value controls whether programs with certain security attributes, such as system-		
		 state and authority adoption, can be restored.
	•	Force Conversion on Restore (QFRCCVNRST)—97% of servers are running below the 	
		 recommended level of 3.
	 	 This value, preset at level 1, controls whether some types of objects are converted during 	
		 a restore.
	•	Verify Object on Restore (QVFYOBJRST)—97% of servers are running below the
		 recommended level of 3.
		 This value, preset at level 1, controls whether a signature will be validated when a digitally 	
		 signed object is restored.
	 Control Defect: Approximately one-third of the systems surveyed are not following the best 	
	 practice for overall system security as recommended by IBM and all independent experts.
	 Relevant COBIT Objectives:
	 PO2.3 Data Classification Scheme
POWERFUL USERS
IT professionals require special authorities to manage servers. In addition to changing system
configuration, these authorities may permit the ability to view or change financial applications,
customer credit card data, and confidential employee files.
In careless, misguided, or malicious hands, these special authorities can cause serious damage.
Because of the risk, auditors require you to limit the users who have these special authorities
and carefully monitor and audit their use.
There are eight types of special authority in IBM i (i5/OS, OS/400). Figure 3 (opp. page) shows
the average number of user profiles for each special authority.
2013 State of IBM i Security Study
p. 8
The PowerTech Group
www.powertech.com • info@powertech.com
FIGURE 3: POWERFUL USERS (SPECIAL AUTHORITIES)
Of all the special authorities, one provides the user with the unrestricted ability to view,
change, and delete every file and program on the system. As shown in Figure 3, *ALLOBJ
authority is granted to users in unacceptably high numbers.
IBM does not publish any documentation for the functions available with each of the special
authorities, which leads to resistance by IT to remove authorities for fear of “breaking” existing
operations.
While it is difficult to create a hard and fast rule for all environments, IBM i security experts agree
that the number of users with this special authority should be kept to the barest minimum.
In general, it’s best to keep the number of users with special authority to less than 10.
Only 3 of the systems reviewed have 10 or fewer users with *ALLOBJ authority. The most
frequently granted special authority is Spool Control (*SPLCTL) with more than 14% of users
carrying the capability to access any spooled file in any output queue without restriction.
	 Control Defect: Overwhelmingly the IBM i servers in this sample have too many profiles 	
	 with powerful authorities. In the hands of careless or disgruntled employees, this could 		
	 result in data loss, theft, or damage. Auditors check for the abuse of special authorities as 	
	 part of any standard IBM i audit. Even auditors who are not very familiar with the IBM i 		
	 environment are aware of this issue from other platforms.
	 Relevant COBIT objectives:
	 DS5.3 Identity Management
	 DS5.4 User Account Management
IBMiSpecialAuthorities
Number of User Profiles
“Best practices call
for less than 10
users with special
authorities.”
2013 State of IBM i Security Study
p. 9
The PowerTech Group
www.powertech.com • info@powertech.com
PASSWORD MANAGEMENT AND USER SECURITY
User and password security issues are critical because they represent the most obvious—
and most easily exploited—method to compromise your system.
Without proper user and password security measures in place, efforts to secure other areas
of an IBM i network are largely ineffective. How can you be sure that the user signed on is the
same user that the ID and password were assigned to?
Inactive Profiles
In this study, we also looked at the number of inactive profiles—profiles that have not been used
in the last 30 days or more. Inactive profiles create a security exposure because these accounts
are not actively maintained by their users and are prime targets for hijacking.
Figure 4 shows an average of 207 enabled profiles (19% of the total) have not signed on in the
past 30 days or more.
FIGURE 4: INACTIVE PROFILES
DEFAULT PASSWORDS
PowerTech checked for profiles that have a default password—where the password is the same
as the username. Because this is the default when new user profiles are created, it is a particu-
larly high-risk factor for IBM i servers.
In one interesting statistic in the study, nearly 4% of enabled user profiles have default pass-
words (Figure 5). Half (51 out of 101) of the systems in the study have more than 30 user profiles
with default passwords. One system has 368 enabled user profiles with default passwords out
of 1,711 total users.
NumberofProfiles
All Inactive Profiles Enabled, Inactive Profiles
2013 State of IBM i Security Study
p. 10
The PowerTech Group
www.powertech.com • info@powertech.com
FIGURE 5: DEFAULT PASSWORDS
Many companies name their user accounts or profiles based on a standard format, such as first
name initial followed by surname (for example, jsmith or tjones). A hacker, or malicious employee,
can guess profile names like jsmith and try default passwords. It’s even easier for an employee
who understands the user profile convention to guess account names and try default passwords,
especially if they are aware of accounts that have been created, but not yet used.
Password Length
IBM i provides the capability to require a minimum length for passwords. Shorter passwords
may be easier to remember, but they’re also easier for others to guess. Figure 6 shows the
setting for the minimum password value on the systems reviewed. The vast majority have the
minimum length set to 6 characters or greater. However, regulatory compliance such as the
Payment Card Industry Data Security Standard (PCI DSS) requires longer passwords.
FIGURE 6: MINIMUM PASSWORD LENGTH
“Default passwords
are a particularly
high-risk factor.
One IBM i system
have 368 user pro-
files with default
passwords out of
1,711 total users—
over 20%.”
All Profiles with
Default Passwords
All Enabled Profiles
with Defauls Passwords
NumberofSystems
NumberofSystems
System Value: QPWDMINLEN
2013 State of IBM i Security Study
p. 11
The PowerTech Group
www.powertech.com • info@powertech.com
Other Password Settings
Several other features can ensure strict password control on an IBM i server, but
system administrators do not always use them. These settings help to make
passwords harder to guess, and increase the protection of your system. Some of
the more important password settings, and the study findings of their use, are:
	 •	 55% of systems don’t require a digit in passwords.
	 •	 28% of systems do not require passwords to differ from the
		 previous password.
	 •	 30% of systems do not set an expiration time for passwords—
		 users are never forced to change their password.
While good password controls are important, a password expiration policy is equally important.
Best practice for a password expiration policy is to set the expiration interval at a maximum of
90 days. According to systems in our study, the average password expiration interval is 82 days.
However, 31% of the systems still have their default password expiration interval set to *NONE.
If your system is used for accounting or financial reporting, it’s best to set a shorter interval for
this default system value. Work with your auditors to determine the best policy for your system.
Invalid Sign On Attempts
This is another area worth closer examination. Many systems in our annual study had several
profiles with invalid sign on attempts. It happens to everyone from time to time. Password are
forgotten, mistyped, or simply mixed up with other passwords. Help desk personnel charged
with resetting these passwords often work with the same users over and over. How do you track
which users have multiple invalid sign on attempts? What if your powerful profiles are targeted?
A single invalid attempt, or even a handful of unsuccessful tries, may not be cause for concern.
But what if your system had one user profile with hundreds of invalid sign on attempts?
Consider the system in our study with 516,772 invalid sign on attempts.
Three, five, or even ten attempts are probably the sign of a frustrated user. Larger numbers
could indicate an intrusion attempt.
Numbers like 1,000, 15,000, or 700,000 are probably a sign of a broken application that doesn’t
have a built-in mechanism to identify invalid attempts.
The risk level increases significantly if the offending profile is determined to be, for example,
QSECOFR, and is not disabled automatically, or if the security team has no way to be notified of
failed access attempts in a timely manner.
It is worth noting that one of the opt-out compliance assessments reported 6.9 million sign on
attempts against one single profile. The obvious concern over this startling and repetitious sign
on activity is over-shadowed only by the fact that the organization was totally unaware of it.
“The PCI standard
requires a minimum
password length of
at least 7 characters
for compliance.”
2013 State of IBM i Security Study
p. 12
The PowerTech Group
www.powertech.com • info@powertech.com
Figure 7 shows the action taken when the maximum number of allowed sign on attempts is
exceeded. In 87% of cases, the profile is disabled and this is recommended. When using named
devices (as opposed to virtual device names) the recommendation is expanded to include
disablement of the device description. It is not recommended to disable virtual devices as the
system typically creates a new device when the user reconnects.
FIGURE 7: DEFAULT ACTION FOR EXCEEDING INVALID SIGN ON ATTEMPTS
	 Control Defect: Overall, the results show that password management procedures are 		
	 weak and many user IDs are vulnerable to identity theft. Figure 3: Powerful Users, shows 	
	 that there are an unacceptably high number of powerful user profiles.
	 What happens if a hacker or a disgruntled employee finds his or her way into an account 	
	 with *ALLOBJ authority?
	 Relevant COBIT Objectives:
	 DS5.3 Identity Management
	 DS5.4 User Account Management
Data Access
On non-IBM i servers, users who are not granted permission to an object or task have no
authority. With IBM i, this is not the case.
Unless the user is granted a specific authority—granting or denying access—then the user will
be granted the default permission. This isn’t a problem unless we discover that the default
authority provides permission for a user to invoke a program and to read, change, and even
delete data from a file.
2013 State of IBM i Security Study
p. 13
The PowerTech Group
www.powertech.com • info@powertech.com
To reduce the risk of unauthorized program changes and database alterations, auditors recom-
mend that users should not be authorized to read or change production databases or source
code without a proven business requirement.
In this study, PowerTech uses the *PUBLIC access rights to libraries as a simple measurement
indicating how accessible IBM i data would be to the average end user.
Figure 8 details the level of access that *PUBLIC has to libraries on the systems in our study. If
*PUBLIC has at least *USE authority to a library, anyone who can log in to the system can get a
catalog of all objects in that library. Once a user gains access to a library, they may be able to
access the objects in the library. They may even be able to delete objects from the library if they
possess the necessary authority to the specific object.
*USE authority to a file means any user with FTP access can download (read) the data. The FTP
GET function or ODBC operations in tools like Microsoft Excel allow even a novice end user to
access your data.
*CHANGE authority to a library allows the user to place new objects in the library and to
change some of the library characteristics.
*ALL access allows anyone on the system to manage, rename, specify security for, or even
delete a library (if they have delete authority to the objects in the library).
FIGURE 8: *PUBLIC AUTHORITY TO DATA
Our findings demonstrate that IBM i shops still have far too many libraries accessible to the
average user. The statistics for DB2 libraries indicate a lack of adequate control over the data,
which often includes critical corporate financial information.
The method used to determine what authority *PUBLIC will have to newly created files and
programs typically comes from the library’s Default Create Authority (CRTAUT) parameter.
2013 State of IBM i Security Study
p. 14
The PowerTech Group
www.powertech.com • info@powertech.com
Figure 9 indicates that 17% of libraries reviewed have Default Create Authority set to *USE,
*CHANGE, or *ALL. However, more than 80% of libraries deferred the setting to the QCRTAUT
system value (*SYSVAL).
Figure 9A extends the library level assignment of *SYSVAL and reflects that the system value
typically remains at the shipped default of *CHANGE. In fact, not even a single system has been
configured to enforce the least-access requirement of common regulatory standards such as PCI.
This means that when new files and programs are created on these systems, the average user
automatically has change rights to the vast majority of those new objects. On these systems,
when anyone creates a new file in one of these libraries, *PUBLIC has the authority to read, add,
change, and delete data from the file. *PUBLIC also can copy data from, or upload data to, the
file, and even change some of the object characteristics of the file.
FIGURE 9: DEFAULT CREATE AUTHORITY BY LIBRARY
	
	 Control Defect: Overall, these results show that virtually every system user has access 		
	 to data far beyond their demonstrated need. Auditors typically look to ensure that the 		
	 company has adequate separation of duties and appropriate controls in place to 		
	 enforce the separation of duties.
	 Relevant COBIT Objective:
	 DS5.4 User Account Management
FIGURE 9A:
*SYSVAL PROPERTIES
2013 State of IBM i Security Study
p. 15
The PowerTech Group
www.powertech.com • info@powertech.com
Network Access Control And Auditing
Over the years, IBM has extended the power of IBM i by adding tools that allow data to be
accessed from other platforms, especially PCs. Well-known services such as FTP, ODBC, JDBC,
and DDM are active and ready to send data across the network as soon as the machine is
powered on. Any user with a profile on the system and authority to the objects, can access
critical corporate data on your Power Systems server.
Even when administrators do not purposely install data access tools on users’ PCs, end users
can access data using free tools downloaded from the internet or tools that are included with
other software loaded on their PCs. For example, Windows comes with FTP client software that
easily sends or retrieves data from an IBM i server.
Worse yet, the results from the Data Access area indicate that object-level authority is poorly
implemented on most systems. The combination of open access rights to data, overly powerful
users, and convenient tools to access the data from a PC, is a perfect storm of IBM i security
exposures.
Beyond data access, some TCP services permit the execution of server commands. The easily-
accessed FTP service enables commands to be run by all users—even those without command
line permission on their profile. This is still a shock to many system administrators and unknown
to many managers and auditors.
The statistics in Figure 10 show that REXEC is often not automatically started but that FTP is
almost always active and listening.
FIGURE 10: REXEC AND FTP AUTOSTART
FTP AUTOSTARTED? REXEC AUTOSTARTED?
2013 State of IBM i Security Study
p. 16
The PowerTech Group
www.powertech.com • info@powertech.com
To reduce this serious exposure, IBM provides interfaces known as exit points that allow admin-
istrators to secure their systems. An exit program attached to an exit point can monitor and
restrict network access to the system. IBM i shops can write their own exit programs or pur-
chase packaged software to accomplish this task. Without exit programs in place, IBM i does
not provide any audit trail of user activity originating through common network access tools
such as FTP and ODBC.
An exit program should have two main functions: to audit access requests and to provide
access control that augments IBM i object-level security. The study assumes that all designated
exit programs satisfy all of these minimum requirements.
PowerTech reviewed 27 different network exit point interfaces on each system to check wheth-
er an exit program is registered. Only 31% of the systems have any exit programs in place that
could potentially log and control network access (Figure 11).
Even on the systems with exit programs, coverage is often incomplete. Of the 31% of systems
with programs in place, 10% have only 1 registered exit program and only 6% have programs
registered to all of the network access exit points. The most common exit point covered is
ODBC (for initial connection only), followed by FTP Server.
FIGURE 11: EXIT PROGRAMS IN PLACE
Users with Command Line Access
The traditional way to control access to sensitive data and powerful commands was to limit
command line access for end users. And in the past, this method was effective.
“Without exit programs in
place, IBM i can’t audit user
activity through network
access tools such as FTP
and ODBC.”
2013 State of IBM i Security Study
p. 17
The PowerTech Group
www.powertech.com • info@powertech.com
In addition to configuring the user profile with limited capabilities, application menus controlled
how users accessed data and when they had access to a command line. However, as IBM allows
new interfaces and remote commands, this approach isn’t as sound as it used to be.
According to our 2013 results, 29% of users have command line access through traditional
menu-based interfaces. Of those 317 users, we found that 18% of the profiles are enabled.
Several network interfaces do not acknowledge the command line limitations configured in a
user profile and must be controlled in other ways. This means that users can run commands
remotely, even when system administrators have purposely taken precautions to restrict them
from using a command line.
	 Control Defect: Based on the broad *PUBLIC authority demonstrated in the Data Access 	
	 area, anyone on these systems can access data, commands, and programs without the 		
	 operating system keeping a record.
	 Even companies that have installed exit program solutions to protect their data frequently 	
	 neglect some of the critical access points. It appears that many companies in the IBM i 		
	 community are dangerously unaware of the wide-open network access problem. The lack 	
	 of monitoring and control of network access is a serious deficiency in many shops.
	 Relevant COBIT Objectives:
	 DS5.4 User Account Management
	 DS5.5 Security Testing, Surveillance, and Monitoring
System Auditing
One of the significant security features of IBM i is its ability to log important security-related
events into a tamper-proof repository. However, 12% of the systems reviewed are not using the
audit journal (Figure 12, opp. page), indicating a very low level of scrutiny.
These systems are unable to review recent history to determine the source of critical security
events, such as:
	 •	 Who deleted this file?
	 •	 Who gave this user *ALLOBJ authority?
Although 88% (IBM i servers auditing their systems) is the best number we have seen in recent
years, there remains inconsistency in the types of events that are audited. Some configurations
suggest that auditing has been activated by High-Availability (HA) applications that must
replicate events to back up systems. Audit event types such as *AUTFAIL (Authority Failures)
are not required in an HA infrastructure and often identify that customers are not using the
auditing facility for security purposes.
2013 State of IBM i Security Study
p. 18
The PowerTech Group
www.powertech.com • info@powertech.com
When the Security Audit Journal is activated, the volume of data it contains is often so large
and the contents so cryptic, that most IT staff have trouble monitoring the logged activity with
the tools available in the operating system. A few software vendors provide auditing tools that
report on and review the system data that’s written to the Security Audit Journal. But, only 27%
of the systems in the PowerTech study have a recognizable tool installed.
Companies today are overwhelmed by the amount of reporting required to demonstrate
compliance with regulations such as Sarbanes-Oxley (SOX) and the Payment Card Industry
Data Security Standard (PCI DSS), yet it appears that very few of them take advantage of the
tools that are available to automate and simplify reporting tasks.
FIGURE 12: SYSTEMS USING THE IBM i AUDIT JOURNAL
	
	 Control Defect: On most of the systems surveyed, security violations could occur undetected. 	
	 Companies that use the Security Audit Journal are in a far better position than those that 	
	 don’t because, at any time, they can use an automated tool to sift through and interpret the 	
	 audit journal entries.
	 Given the voluminous amounts of raw data that is collected in the IBM Security Audit 		
	 Journal, it’s not realistic to expect system administrators to manually review the logs 		
	 regularly. The job of filtering and analyzing massive amounts of complex raw data requires 	
	 software tools. A software auditing tool reduces the costs associated with compliance 		
	 reporting and increases the likelihood that this work will get done.
	 Relevant COBIT objectives:
	 DS5.5 Security Testing, Surveillance, and Monitoring
“The absence of the
Security Audit Journal
indicates a very low
level of security.”
2013 State of IBM i Security Study
p. 19
The PowerTech Group
www.powertech.com • info@powertech.com
Conclusion
IBM Power Systems have long been perceived as one of the most secure platforms available.
But experts agree that IBM i security is only as effective as the policies, procedures, and
configurations put in place to manage it.
This study highlighted a number of common security exposures and configuration management
practices that must be addressed to protect the data on IBM i systems.
The study demonstrated that all organizations could improve the IT controls on their IBM i
server. In particular, there are six critical areas that warrant immediate inspection and action:
1. Powerful User Profiles—The control defect most readily recognized by both executives and IT
professionals is the unbridled and unmonitored power that some users have over system
applications and data. Auditors routinely cite this lack of control when auditing for separation
of duties in IBM i shops.
	Recommendations:
	 •	 Document and enforce separation of duties for powerful users. Avoid having any one 		
		 all-powerful user, all the time.
	 •	 Monitor, log, and report on the use of powerful authorities. Be prepared to justify the use 	
		 of powerful authorities to auditors and managers.
	 •	 Implement a solution, such as PowerTech Authority Broker,™ to automatically monitor, 	
		 control, and audit users who need access to higher levels of authority.
	 •	 Monitor and secure the use of sensitive commands. PowerTech Command Security™ can 	
		 prevent unauthorized users from executing a monitored command.
2. User and Password Management—The integrity of user IDs and passwords is a critical
component of secure system access. Experienced system managers know that a little bit of
attention here can go a long way toward keeping systems secure.
	Recommendations:
	 •	 Review user accounts on a regular basis to assure that each user’s access is appropriate 	
		 to their job responsibilities. Automating this step is essential if it is to become a regular 	
		 part of operations. PowerTech Compliance Monitor™ makes it easy to generate audit 		
		 reports on a regular basis that compare IBM i user and password information against policy.
	 •	 Use a profile management solution to maintain consistency of your user profiles across 	
		systems. PowerTech PowerAdmin™ uses a template-based approach to manage user 		
		 profiles from a central management system.
2013 State of IBM i Security Study
p. 20
The PowerTech Group
www.powertech.com • info@powertech.com
	 •	 Establish and enforce password policies that make it difficult to compromise
		 a user’s account.
	 •	 Use IBM i system values that make passwords more difficult to guess.
	 •	 Eliminate passwords entirely by implementing a Single Sign On (SSO) solution based on 	
		 the Enterprise Identity Mapping (EIM) technology that is included in the operating system.
3. Data Access—System managers require better processes and tools to monitor and control
access to IBM i data.
	Recommendations:
	 •	 Use the security capabilities of the IBM i OS. Where possible, secure data using resource-	
		 level security to protect individual application and data objects.
	 •	 When it is not possible, or practical, to protect data with resource-level security, use exit 	
		 program technology to regulate access to the data. PowerTech Network Security™ is the 	
		 industry’s leading off-the-shelf exit program solution.
	 •	 Monitor changes to your database information. PowerTech DataThread™ creates before-	
		 and-after snapshots of database changes and requires users to sign for changes, so you 	
		 can meet compliance requirements.
	 •	 Investigate how well your third-party software suppliers use operating system resource 	
		 level security. Seek assistance from the vendor in protecting application objects.
	 •	 Ensure that application libraries are secured from general users on the system. (Set the 	
		 System Value and Library values for Default Create Authority to the most restrictive 		
		 setting [*EXCLUDE].)
4. Network Access Control and Auditing—This is nonexistent in most IBM i shops, so both
authorized and unauthorized access occurs without accountability or traceability. IBM’s exit
point technology provides the ability to control and monitor network data access. However, the
study indicates that the adoption rate of exit points has not kept pace with the adoption rate of
network data access utilities.
	Recommendations:
	 •	 Implement exit programs using PowerTech Network Security to monitor and control 		
		 users’ access through network interfaces such as ODBC and FTP.
	 •	 Review network data access transactions for inappropriate or dangerous activity.
	 •	 Establish clear guidelines for file download and file sharing permissions.
	 •	 Remove default DB2 access in tools like Microsoft Excel and IBM i Access (Client Access).
2013 State of IBM i Security Study
p. 21
The PowerTech Group
www.powertech.com • info@powertech.com
5. System Auditing—Given the volume of security-related transactions that occur on a system
in a typical day, tools are essential to quickly find the information that deserves your attention.
	Recommendations:
	 •	 Use the IBM-supplied Security Audit Journal (QAUDJRN) to ensure that important events 	
		 are recorded in a non-alterable log.
	 •	 Implement PowerTech Compliance Monitor to simplify the task of reviewing audit logs for 	
		 relevant events such as object deletions, user ID promotions, and system value changes.
	 •	Implement PowerTech Interact™ to include IBM i security data into your Security Informa-	
		 tion & Event Management (SIEM) solutions that support ISS, CEF, or SYSLOG formats.
6. System Security Values—System values regulate how easy or difficult it is for an outsider to
use or abuse your system. Poorly configured or unmonitored system values are an unacceptable
security risk. Organizations that are unsure of the potential impact may want to consult with
IBM i security professionals before making changes, but a solution should be applied quickly.
	Recommendations:
	 •	 Define and implement a security policy that incorporates the most secure settings your 	
		 environment will tolerate. (Seek professional expertise if you are unsure of the impact of 	
		 certain settings.)
	 •	 Download PowerTech’s free Open Source Security Policy to help you get started defining 	
		 your own policy.
	 •	 Run the System Values reports and scorecards in PowerTech Compliance Monitor on a 	
		 regular basis to ensure that your system settings match your policy.
2013 State of IBM i Security Study
p. 22
The PowerTech Group
www.powertech.com • info@powertech.com
Appendix I: COBIT
Organizations that start security projects quickly discover that legislation is vague when it
comes to IT security issues. Legislation seldom gives specific actionable recommendations
and never mentions specific platforms like Power Systems running IBM i.
Where should you look when evaluating your business-critical servers?
For SOX, the U.S. Securities and Exchange Commission (SEC) has ruled that management must
evaluate the company’s internal controls over financial reporting using an acceptable, recog-
nized control framework. This requirement for frameworks also applies to the Information
Technology (IT) arms of the organization. Some of the best known standards are COBIT, ISO
27002, and ITIL.
While there is no “golden standard,” most large audit firms now use COBIT as a generally
accepted standard for IT security and internal control practices. Several of the COBIT objectives
that are relevant to security compliance on IBM i servers are outlined here:
DS5.3 Identity Management
Ensure that all users (internal, external, and temporary) and their activity on IT systems
(business application, IT environment, system operations, development and maintenance)
are uniquely identifiable. Enable user identities via authentication mechanisms. Confirm that
user access rights to systems and data are in line with defined and documented business needs
and that job requirements are attached to user identities. Ensure that user access rights are
requested by user management, approved by system owners and implemented by the security
responsible person. Maintain user identities and access rights in a central repository.
Deploy cost-effective technical and procedural measures, and keep them current to establish
user identification, implement authentication and enforce access rights.
DS5.4 User Account Management
Address requesting, establishing, issuing, suspending, modifying, and closing user accounts and
related user privileges with a set of user account management procedures. Include an approval
procedure outlining the data or system owner granting the access privileges. These procedures
should apply for all users, including administrators (privileged users) and internal and external
users, for normal and emergency cases. Rights and obligations relative to access to enterprise
systems and information should be contractually arranged for all types of users. Perform
regular management review of all accounts and related privileges.
DS5.5 Security Testing, Surveillance, and Monitoring
Test and monitor the IT security implementation in a proactive way. IT security should be
reaccredited in a timely manner to ensure that the approved enterprise’s information security
baseline is maintained. A logging and monitoring function will enable the early prevention and/
or detection and subsequent timely reporting of unusual and/or abnormal activities that may
need to be addressed.
2013 State of IBM i Security Study
p. 23
The PowerTech Group
www.powertech.com • info@powertech.com
PO2.3 Data Classification Scheme
Establish a classification scheme that applies throughout the enterprise, based on the criticality
and sensitivity (e.g., public, confidential, top secret) of enterprise data. This scheme includes
details about data ownership, definition of appropriate security levels and protection controls,
and a brief description of data retention and destruction requirements, criticality, and sensitiv-
ity. It should be used as the basis for applying controls such as access controls, archiving, or
encryption.
Appendix II: PowerTech Solutions
As the leading expert in IBM i security, PowerTech has developed an extensive line of powerful
solutions designed to address shortcomings in the operating system, provide advanced func-
tionality in access control and auditing, and ease the cost and burden of maintaining regulatory
compliance.
Table 2 outlines the available security modules and their purpose.
TABLE 2: POWERTECH’S COMPREHENSIVE SUITE OF SECURITY SOLUTIONS
Custom auditing and reporting
Access control by exit programs
Management of privileged users
Real-time security reporting
Real-time database monitoring
Command monitoring and control
Centralized user profile management
TEL USA:	 +1 253-872-7788
TOLL FREE:	 +1 800-915-7700
TEL UK:	 +44 (0) 870 120 3148
The PowerTech Group
www.powertech.com • info@powertech.com
Copyright 2013. PowerTech is a registered trademark of Help/Systems, LLC. AS/400
and System i are registered trademarks of IBM. All other product and company names
are trademarks of their respective holders. C051SS3
About the Study Authors
PowerTech is the leading expert in automated security solutions for IBM Power Systems servers,
helping users manage today’s compliance regulations and data privacy threats. Our security
solutions are designed to save your valuable IT resources, giving you ongoing protection and
peace of mind.
Because Power Systems servers often host sensitive corporate data, organizations need to
practice proactive compliance security. As an IBM Advanced Business Partner with over 1,000
customers worldwide, PowerTech understands corporate vulnerability and the risks associated
with data privacy and access control. PowerTech security solutions are the corporate standard
for IBM i security at many major international financial institutions.
PowerTech is a division of Help/Systems, LLC and maintains its corporate headquarters in Eden
Prairie, Minnesota. Founded in 1996 by security experts, PowerTech has demonstrated a proven
commitment to the security and compliance market and leads the industry in raising awareness
of IBM i security issues and solutions.
	 •	 PowerTech is a member of the PCI Security Standards Council, a global open standards 	
		 body providing guidance to the Payment Card Industry Data Security Standard. PowerTech 	
		 works with the council to evolve the PCI DSS and other payment and data protection 	
		standards.
	 •	 PowerTech is a member the IBM i Independent Software Vendor (ISV) council.
	 •	 PowerTech publishes an Open Source Security Policy for IBM i as a part of its mission to 	
		 promote awareness of common security challenges and ensure the integrity and confi-	
		 dentiality of IBM i data.
	 •	 PowerTech is authorized to issue continuing professional education (CPE) credits for
		 IBM i security education by the National Association of State Boards of Accountancy,
		 Inc. (NASBA).

More Related Content

What's hot

3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
IBM Security
 
Bml 303 past papers pack
Bml 303 past papers packBml 303 past papers pack
Bml 303 past papers pack
San King
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
IBM Sverige
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
IBM Security
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
IBM Security
 
Implementing IT Security Controls
Implementing IT Security ControlsImplementing IT Security Controls
Implementing IT Security Controls
Thomas Jones
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce apps
Symantec
 
Linda Lopez Resume 20170130 IT Security
Linda Lopez Resume 20170130 IT SecurityLinda Lopez Resume 20170130 IT Security
Linda Lopez Resume 20170130 IT Security
Linda Lopez
 
Ibm q radar_blind_references
Ibm q radar_blind_referencesIbm q radar_blind_references
Ibm q radar_blind_references
Maarten Werff
 
It security-plan-template
It security-plan-templateIt security-plan-template
It security-plan-template
jbmills1634
 
Self healing-systems
Self healing-systemsSelf healing-systems
Self healing-systems
SKORDEMIR
 
Comprehensive risk management for a cyber secure organization
Comprehensive risk management for a cyber secure organizationComprehensive risk management for a cyber secure organization
Comprehensive risk management for a cyber secure organization
Joe Hessmiller
 
Automation of Information (Cyber) Security by Joe Hessmiller
Automation of Information (Cyber) Security by Joe HessmillerAutomation of Information (Cyber) Security by Joe Hessmiller
Automation of Information (Cyber) Security by Joe Hessmiller
Joe Hessmiller
 
Hp It Performance Suite Customer Presentation
Hp It Performance Suite Customer PresentationHp It Performance Suite Customer Presentation
Hp It Performance Suite Customer Presentation
esbosman
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
IBM Security
 
E Mail Security Solution Industry Report PowerPoint Presentation Slides
E Mail Security Solution Industry Report PowerPoint Presentation SlidesE Mail Security Solution Industry Report PowerPoint Presentation Slides
E Mail Security Solution Industry Report PowerPoint Presentation Slides
SlideTeam
 
Thinking of choosing Trend Micro?
Thinking of choosing Trend Micro?Thinking of choosing Trend Micro?
Thinking of choosing Trend Micro?
Symantec
 
IRJET- Employee Task Management System with High Authentication
IRJET- Employee Task Management System with High AuthenticationIRJET- Employee Task Management System with High Authentication
IRJET- Employee Task Management System with High Authentication
IRJET Journal
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
IBM Security
 
Ijcet 06 10_002
Ijcet 06 10_002Ijcet 06 10_002
Ijcet 06 10_002
IAEME Publication
 

What's hot (20)

3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
Bml 303 past papers pack
Bml 303 past papers packBml 303 past papers pack
Bml 303 past papers pack
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
 
Implementing IT Security Controls
Implementing IT Security ControlsImplementing IT Security Controls
Implementing IT Security Controls
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce apps
 
Linda Lopez Resume 20170130 IT Security
Linda Lopez Resume 20170130 IT SecurityLinda Lopez Resume 20170130 IT Security
Linda Lopez Resume 20170130 IT Security
 
Ibm q radar_blind_references
Ibm q radar_blind_referencesIbm q radar_blind_references
Ibm q radar_blind_references
 
It security-plan-template
It security-plan-templateIt security-plan-template
It security-plan-template
 
Self healing-systems
Self healing-systemsSelf healing-systems
Self healing-systems
 
Comprehensive risk management for a cyber secure organization
Comprehensive risk management for a cyber secure organizationComprehensive risk management for a cyber secure organization
Comprehensive risk management for a cyber secure organization
 
Automation of Information (Cyber) Security by Joe Hessmiller
Automation of Information (Cyber) Security by Joe HessmillerAutomation of Information (Cyber) Security by Joe Hessmiller
Automation of Information (Cyber) Security by Joe Hessmiller
 
Hp It Performance Suite Customer Presentation
Hp It Performance Suite Customer PresentationHp It Performance Suite Customer Presentation
Hp It Performance Suite Customer Presentation
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
E Mail Security Solution Industry Report PowerPoint Presentation Slides
E Mail Security Solution Industry Report PowerPoint Presentation SlidesE Mail Security Solution Industry Report PowerPoint Presentation Slides
E Mail Security Solution Industry Report PowerPoint Presentation Slides
 
Thinking of choosing Trend Micro?
Thinking of choosing Trend Micro?Thinking of choosing Trend Micro?
Thinking of choosing Trend Micro?
 
IRJET- Employee Task Management System with High Authentication
IRJET- Employee Task Management System with High AuthenticationIRJET- Employee Task Management System with High Authentication
IRJET- Employee Task Management System with High Authentication
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
 
Ijcet 06 10_002
Ijcet 06 10_002Ijcet 06 10_002
Ijcet 06 10_002
 

Similar to IBM System i Security Study 2013

IBM i for Enterprise Businesses Quantifying the Value of Resilience
IBM i for Enterprise Businesses Quantifying the Value of ResilienceIBM i for Enterprise Businesses Quantifying the Value of Resilience
IBM i for Enterprise Businesses Quantifying the Value of Resilience
IBM India Smarter Computing
 
ISE 510 Final Project Scenario Background Limetree In.docx
ISE 510 Final Project Scenario  Background Limetree In.docxISE 510 Final Project Scenario  Background Limetree In.docx
ISE 510 Final Project Scenario Background Limetree In.docx
christiandean12115
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
IBM Security
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
IBM Security
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
christiandean12115
 
Energy Sector Security Metrics - June 2013
Energy Sector Security Metrics - June 2013Energy Sector Security Metrics - June 2013
Energy Sector Security Metrics - June 2013
Andy Bochman
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
IBM
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control Costs
IBM Security
 
Getting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessGetting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC Access
HelpSystems
 
Securing Java in the Server Room
Securing Java in the Server RoomSecuring Java in the Server Room
Securing Java in the Server Room
Tim Ellison
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaS
ftculotta27
 
5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You
HelpSystems
 
Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?
Precisely
 
IBM IT Operations Analytics for z Systems
IBM IT Operations Analytics for z SystemsIBM IT Operations Analytics for z Systems
IBM IT Operations Analytics for z Systems
IBM z Systems Software - IT Service Management
 
IBM IT Operations Analytics for z systems
IBM IT Operations Analytics for z systemsIBM IT Operations Analytics for z systems
IBM IT Operations Analytics for z systems
IBM z Systems Software - IT Service Management
 
IBM i for Midsize Businesses Minimizing Costs and Risks for Midsize Businesses
IBM i for Midsize Businesses Minimizing Costs and Risks for Midsize BusinessesIBM i for Midsize Businesses Minimizing Costs and Risks for Midsize Businesses
IBM i for Midsize Businesses Minimizing Costs and Risks for Midsize Businesses
IBM India Smarter Computing
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.com
PrescottLunt386
 
IRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data Collection
IRJET Journal
 
JavaOne2013: Securing Java in the Server Room - Tim Ellison
JavaOne2013: Securing Java in the Server Room - Tim EllisonJavaOne2013: Securing Java in the Server Room - Tim Ellison
JavaOne2013: Securing Java in the Server Room - Tim Ellison
Chris Bailey
 
PCI Compliance white paper
PCI Compliance white paper PCI Compliance white paper
PCI Compliance white paper
HelpSystems
 

Similar to IBM System i Security Study 2013 (20)

IBM i for Enterprise Businesses Quantifying the Value of Resilience
IBM i for Enterprise Businesses Quantifying the Value of ResilienceIBM i for Enterprise Businesses Quantifying the Value of Resilience
IBM i for Enterprise Businesses Quantifying the Value of Resilience
 
ISE 510 Final Project Scenario Background Limetree In.docx
ISE 510 Final Project Scenario  Background Limetree In.docxISE 510 Final Project Scenario  Background Limetree In.docx
ISE 510 Final Project Scenario Background Limetree In.docx
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
Energy Sector Security Metrics - June 2013
Energy Sector Security Metrics - June 2013Energy Sector Security Metrics - June 2013
Energy Sector Security Metrics - June 2013
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control Costs
 
Getting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessGetting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC Access
 
Securing Java in the Server Room
Securing Java in the Server RoomSecuring Java in the Server Room
Securing Java in the Server Room
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaS
 
5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You
 
Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?
 
IBM IT Operations Analytics for z Systems
IBM IT Operations Analytics for z SystemsIBM IT Operations Analytics for z Systems
IBM IT Operations Analytics for z Systems
 
IBM IT Operations Analytics for z systems
IBM IT Operations Analytics for z systemsIBM IT Operations Analytics for z systems
IBM IT Operations Analytics for z systems
 
IBM i for Midsize Businesses Minimizing Costs and Risks for Midsize Businesses
IBM i for Midsize Businesses Minimizing Costs and Risks for Midsize BusinessesIBM i for Midsize Businesses Minimizing Costs and Risks for Midsize Businesses
IBM i for Midsize Businesses Minimizing Costs and Risks for Midsize Businesses
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.com
 
IRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data CollectionIRJET-Managing Security of Systems by Data Collection
IRJET-Managing Security of Systems by Data Collection
 
JavaOne2013: Securing Java in the Server Room - Tim Ellison
JavaOne2013: Securing Java in the Server Room - Tim EllisonJavaOne2013: Securing Java in the Server Room - Tim Ellison
JavaOne2013: Securing Java in the Server Room - Tim Ellison
 
PCI Compliance white paper
PCI Compliance white paper PCI Compliance white paper
PCI Compliance white paper
 

More from Keith Braswell

Automated Asset Tracking in the Data Center: How IBM Reduced the Time/Cost of...
Automated Asset Tracking in the Data Center: How IBM Reduced the Time/Cost of...Automated Asset Tracking in the Data Center: How IBM Reduced the Time/Cost of...
Automated Asset Tracking in the Data Center: How IBM Reduced the Time/Cost of...
Keith Braswell
 
Cashing in on customer insight
Cashing in on customer insightCashing in on customer insight
Cashing in on customer insight
Keith Braswell
 
IBV - Collective Intelligence
IBV - Collective IntelligenceIBV - Collective Intelligence
IBV - Collective Intelligence
Keith Braswell
 
Frontiers of Cloud Computing
Frontiers of Cloud ComputingFrontiers of Cloud Computing
Frontiers of Cloud Computing
Keith Braswell
 
5 steps to healthy data
5 steps to healthy data5 steps to healthy data
5 steps to healthy data
Keith Braswell
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
Keith Braswell
 

More from Keith Braswell (6)

Automated Asset Tracking in the Data Center: How IBM Reduced the Time/Cost of...
Automated Asset Tracking in the Data Center: How IBM Reduced the Time/Cost of...Automated Asset Tracking in the Data Center: How IBM Reduced the Time/Cost of...
Automated Asset Tracking in the Data Center: How IBM Reduced the Time/Cost of...
 
Cashing in on customer insight
Cashing in on customer insightCashing in on customer insight
Cashing in on customer insight
 
IBV - Collective Intelligence
IBV - Collective IntelligenceIBV - Collective Intelligence
IBV - Collective Intelligence
 
Frontiers of Cloud Computing
Frontiers of Cloud ComputingFrontiers of Cloud Computing
Frontiers of Cloud Computing
 
5 steps to healthy data
5 steps to healthy data5 steps to healthy data
5 steps to healthy data
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
 

Recently uploaded

Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 

Recently uploaded (20)

Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 

IBM System i Security Study 2013

  • 1. 2013 State of IBM i Security Study Presented by PowerTech, A Division of Help/Systems
  • 2. 2013 State of IBM i Security Study p. 2 The PowerTech Group www.powertech.com • info@powertech.com INTRODUCTION A breach like this might seem farfetched in the real world—where Power Systems™ servers running IBM i maintain a solid reputation for impenetrable security. But the data from the 2013 State of IBM i Security Study proves these internal threats more possible than not. The face of the cybercriminal is changing and any number of improper security controls— allowing default passwords, not limiting sign on attempts, keeping inactive profiles—could make their breach attempts successful. While IBM i is one of the most securable servers, the prevailing use of incorrect or lax configuration settings leaves it vulnerable to threats. Even if you would personally vouch for the integrity of your staff, remember that SOX, PCI, and other regulatory compliance auditors aren’t asking, “Would they?” or “Might they?” but “Do they have the ability to?” The annual State of IBM i Security study strives to help executives, IT managers, system admins, and auditors understand the important IBM i security exposures and compliance violations and how to correct them in the most efficient and economical way. A star employee sits in her office, curled over her keyboard. It’s after 5, but she’s still here. Coworkers assume a promotion is in the works and admire her loyalty, but she’s got different motives. She types a few characters and hits enter. No luck. Undeterred, she tries a different combination of letters. Nothing…yet. The question isn’t when will she gain access to sensitive IBM i data, the question is— Will the security team catch her in time?
  • 3. 2013 State of IBM i Security Study p. 3 The PowerTech Group www.powertech.com • info@powertech.com WHY THIS STUDY IS IMPORTANT This year marks the 25th birthday of the AS/400, as well as the 10th anniversary of the State of IBM i Security Study. From the AS/400 to iSeries, System i, and finally Power Systems running IBM i, PowerTech has followed the evolution and provided invaluable security insight from more than 1,700 servers worldwide. The results from the 2013 study, and the universal nature of IBM i vulnerabilities, lead us to conclude that if you have IBM i systems in your data center, your organization might suffer from similar internal control deficiencies. WHAT THIS STUDY MEANS FOR YOU Your IBM i server likely runs your mission-critical business applications—and has been for 20 years or more—but the staff that set up server security may be long gone. To complicate things, the integrated nature of many IBM i security controls has caused confu- sion over who is responsible for the configuration—IBM, the customer, or the application provider. As such, many systems operate with default settings due to lack of ownership. You know an IBM i audit is long overdue, but you’re too busy grappling with: • Knowledge gaps • Overextended staff • Lean IT budgets Too often, IBM i security projects take a back seat to Windows and UNIX platforms due to the perception that IBM i is less vulnerable. Consequently, as the threat landscape looms ever greater, the administration of IBM i security controls has lapsed and guards are down. Now here’s the good news: The weaknesses identified through our assessments and docu- mented in this study are caused by poor or missing configurations that can—and should—be corrected. This study shows you the most common and dangerous IBM i security exposures; outlines how to correct them; and explains how these relate to compliance legislation, industry regulations, and IT guidelines and best practices. “The weaknesses identified in this study are caused by poor or missing configurations that can—and should— be corrected.”
  • 4. 2013 State of IBM i Security Study p. 4 The PowerTech Group www.powertech.com • info@powertech.com THE POWER SYSTEMS LANDSCAPE IBM introduced the AS/400 in 1988 as its computing system for small- and medium-sized compa- nies. Today, the Power Systems product line ranges from small servers with a single processor to the Power 780 server, which can have up to sixteen POWER7+ processors with four cores each. The IBM i community includes a large and loyal base throughout the world—with more than 380,000 systems estimated in production use. The PowerTech data was collected from a cross- section of systems of varying sizes. Companies in retail, financial, manufacturing, and distribution industries typically purchased their Power Systems server as part of an integrated business system. Today more than 16,000 banks run their core banking and financial applications on an IBM i server. Many retailers use financial applications that store credit card data on the system. Some of the well-known software vendors that provide applications are: • Oracle (JD Edwards ERP) • Lawson/Intentia (Financials) • FISERVE • SAP • IBM Domino • IBM WebSphere • Jack Henry (Core banking) • INFOR (BPICS, MAPICS, Infinium, Infor ERP XA applications, PRISM) • Manhattan Associates (Supply chain) Given the mission-critical data stored on these systems, maintaining a secure configuration should be a top priority. METHODS Using the Compliance Assessment™ (PowerTech proprietary software, which runs directly from any network-attached PC without modifying IBM system settings), Power Systems running IBM i (System i, iSeries, AS/400) are interrogated across six critical audit areas: • Server-level security controls • Profile and password settings • Administrative capabilities • Network-initiated commands & data access • Public accessibility to corporate data • System event auditing
  • 5. 2013 State of IBM i Security Study p. 5 The PowerTech Group www.powertech.com • info@powertech.com After the analysis is complete, the anonymous security statistics are returned directly to one of our servers. The software does not collect any application-specific data; therefore no informa- tion is available regarding the purpose of the server. Participation in the study is optional. For this year’s study, PowerTech reviewed data from 101 IBM i servers and partitions audited between January and December of 2012. The organizations spanned a broad range of sizes and industry verticals, including financial, healthcare, communications, education, and trans- portation. As in previous years, this is not a random sample. The security officers or other staff at these companies were concerned enough about IBM i security to request an assessment. This may have resulted in a sample that is either unusually security-conscious or, at the other extreme, knowingly deficient. Our experience leads us to believe the latter is closer to the norm. We conduct many more assessments than are included in the study as the recipient of an assessment may opt out from sharing their details. This means we have greater—albeit private—insight into the industry statistics than the study reveals. Everything we see reinforces the study sample. Lastly, this is not a recurring study of the same systems so direct year-to-year comparisons cannot be made. However, some general trends are discussed. The average system assessed for the 2013 study has 1,082 users and 427 libraries. These numbers are a bit higher than the median because there were several large servers in the data sample (Table 1). TABLE 1: AVERAGE SYSTEM SIZE System Size Average Median # of Users 1,082 499 # of Libraries 427 325 All assessed servers are running on supported versions of the OS. Although IBM has declared support will end in September 2013, 41% of the servers remain on V5R4 (Figure 1). Another 41% are on V6R1 and the remaining 18% are running IBM’s latest: V7R1. FIGURE 1: INSTALLED VERSIONS OF IBM i V5R4M0 (41%)* V6R1M0 (41%) V7R1M0 (18%) * IBM support for V5R4 ends on September 30, 2013. IBM recommends direct migration to V7R1.
  • 6. 2013 State of IBM i Security Study p. 6 The PowerTech Group www.powertech.com • info@powertech.com SYSTEM SECURITY IBM i security best practices start with the configuration of numerous system values. Although often undermined by other settings, the system security level (QSECURTY) sets the overall tone. Documented vulnerabilities in security level 30 and below led IBM to recommend and ship level 40 as the minimum. Unfortunately, 37% of servers are operating below this level. Power Systems servers can be configured at one of five different security levels: • Level 10 - No Security. No password required. User IDs are created for any user who attempts to sign on. IBM no longer supports level 10. • Level 20 - Password Security. Every user must have a valid ID and password. Every user with a valid ID and password assumes root-level authority by default. • Level 30 - Resource Security. Object-level authority is enforced as users do not assume root-level authority by default. A moderately knowledgeable programmer or operator can bypass resource level security and assume root-level authority. • Level 40 - Operating System Security. Level 30 protection plus operating system integrity. It is possible for an extremely knowledgeable programmer with access to your system to elevate his or her level of authority, possibly as high as root-level authority. • Level 50 - Enhanced Operating System Security. Level 40 protection plus enhanced operating system integrity. A properly secured system at security level 50 is the best defense. However, even at level 50, other system configuration issues must be addressed. Figure 2 shows the distribution of security settings on the systems. Out of the 101 systems in the 2013 dataset, 37% are running system security level 30 or lower. FIGURE 2: SYSTEM SECURITY LEVEL NumberofSystems System Value: QSECURITY
  • 7. 2013 State of IBM i Security Study p. 7 The PowerTech Group www.powertech.com • info@powertech.com Several other system values related to object restoration often remain at their shipped levels, confirming a typical IBM i configuration of “load and go.” The following three system values work consecutively to determine if an object should be restored, or if it is to be converted during the restore: • Allow Object Restore (QALWOBJRST)—Only 2% of servers have altered this system value from its default *ALL setting. This value controls whether programs with certain security attributes, such as system- state and authority adoption, can be restored. • Force Conversion on Restore (QFRCCVNRST)—97% of servers are running below the recommended level of 3. This value, preset at level 1, controls whether some types of objects are converted during a restore. • Verify Object on Restore (QVFYOBJRST)—97% of servers are running below the recommended level of 3. This value, preset at level 1, controls whether a signature will be validated when a digitally signed object is restored. Control Defect: Approximately one-third of the systems surveyed are not following the best practice for overall system security as recommended by IBM and all independent experts. Relevant COBIT Objectives: PO2.3 Data Classification Scheme POWERFUL USERS IT professionals require special authorities to manage servers. In addition to changing system configuration, these authorities may permit the ability to view or change financial applications, customer credit card data, and confidential employee files. In careless, misguided, or malicious hands, these special authorities can cause serious damage. Because of the risk, auditors require you to limit the users who have these special authorities and carefully monitor and audit their use. There are eight types of special authority in IBM i (i5/OS, OS/400). Figure 3 (opp. page) shows the average number of user profiles for each special authority.
  • 8. 2013 State of IBM i Security Study p. 8 The PowerTech Group www.powertech.com • info@powertech.com FIGURE 3: POWERFUL USERS (SPECIAL AUTHORITIES) Of all the special authorities, one provides the user with the unrestricted ability to view, change, and delete every file and program on the system. As shown in Figure 3, *ALLOBJ authority is granted to users in unacceptably high numbers. IBM does not publish any documentation for the functions available with each of the special authorities, which leads to resistance by IT to remove authorities for fear of “breaking” existing operations. While it is difficult to create a hard and fast rule for all environments, IBM i security experts agree that the number of users with this special authority should be kept to the barest minimum. In general, it’s best to keep the number of users with special authority to less than 10. Only 3 of the systems reviewed have 10 or fewer users with *ALLOBJ authority. The most frequently granted special authority is Spool Control (*SPLCTL) with more than 14% of users carrying the capability to access any spooled file in any output queue without restriction. Control Defect: Overwhelmingly the IBM i servers in this sample have too many profiles with powerful authorities. In the hands of careless or disgruntled employees, this could result in data loss, theft, or damage. Auditors check for the abuse of special authorities as part of any standard IBM i audit. Even auditors who are not very familiar with the IBM i environment are aware of this issue from other platforms. Relevant COBIT objectives: DS5.3 Identity Management DS5.4 User Account Management IBMiSpecialAuthorities Number of User Profiles “Best practices call for less than 10 users with special authorities.”
  • 9. 2013 State of IBM i Security Study p. 9 The PowerTech Group www.powertech.com • info@powertech.com PASSWORD MANAGEMENT AND USER SECURITY User and password security issues are critical because they represent the most obvious— and most easily exploited—method to compromise your system. Without proper user and password security measures in place, efforts to secure other areas of an IBM i network are largely ineffective. How can you be sure that the user signed on is the same user that the ID and password were assigned to? Inactive Profiles In this study, we also looked at the number of inactive profiles—profiles that have not been used in the last 30 days or more. Inactive profiles create a security exposure because these accounts are not actively maintained by their users and are prime targets for hijacking. Figure 4 shows an average of 207 enabled profiles (19% of the total) have not signed on in the past 30 days or more. FIGURE 4: INACTIVE PROFILES DEFAULT PASSWORDS PowerTech checked for profiles that have a default password—where the password is the same as the username. Because this is the default when new user profiles are created, it is a particu- larly high-risk factor for IBM i servers. In one interesting statistic in the study, nearly 4% of enabled user profiles have default pass- words (Figure 5). Half (51 out of 101) of the systems in the study have more than 30 user profiles with default passwords. One system has 368 enabled user profiles with default passwords out of 1,711 total users. NumberofProfiles All Inactive Profiles Enabled, Inactive Profiles
  • 10. 2013 State of IBM i Security Study p. 10 The PowerTech Group www.powertech.com • info@powertech.com FIGURE 5: DEFAULT PASSWORDS Many companies name their user accounts or profiles based on a standard format, such as first name initial followed by surname (for example, jsmith or tjones). A hacker, or malicious employee, can guess profile names like jsmith and try default passwords. It’s even easier for an employee who understands the user profile convention to guess account names and try default passwords, especially if they are aware of accounts that have been created, but not yet used. Password Length IBM i provides the capability to require a minimum length for passwords. Shorter passwords may be easier to remember, but they’re also easier for others to guess. Figure 6 shows the setting for the minimum password value on the systems reviewed. The vast majority have the minimum length set to 6 characters or greater. However, regulatory compliance such as the Payment Card Industry Data Security Standard (PCI DSS) requires longer passwords. FIGURE 6: MINIMUM PASSWORD LENGTH “Default passwords are a particularly high-risk factor. One IBM i system have 368 user pro- files with default passwords out of 1,711 total users— over 20%.” All Profiles with Default Passwords All Enabled Profiles with Defauls Passwords NumberofSystems NumberofSystems System Value: QPWDMINLEN
  • 11. 2013 State of IBM i Security Study p. 11 The PowerTech Group www.powertech.com • info@powertech.com Other Password Settings Several other features can ensure strict password control on an IBM i server, but system administrators do not always use them. These settings help to make passwords harder to guess, and increase the protection of your system. Some of the more important password settings, and the study findings of their use, are: • 55% of systems don’t require a digit in passwords. • 28% of systems do not require passwords to differ from the previous password. • 30% of systems do not set an expiration time for passwords— users are never forced to change their password. While good password controls are important, a password expiration policy is equally important. Best practice for a password expiration policy is to set the expiration interval at a maximum of 90 days. According to systems in our study, the average password expiration interval is 82 days. However, 31% of the systems still have their default password expiration interval set to *NONE. If your system is used for accounting or financial reporting, it’s best to set a shorter interval for this default system value. Work with your auditors to determine the best policy for your system. Invalid Sign On Attempts This is another area worth closer examination. Many systems in our annual study had several profiles with invalid sign on attempts. It happens to everyone from time to time. Password are forgotten, mistyped, or simply mixed up with other passwords. Help desk personnel charged with resetting these passwords often work with the same users over and over. How do you track which users have multiple invalid sign on attempts? What if your powerful profiles are targeted? A single invalid attempt, or even a handful of unsuccessful tries, may not be cause for concern. But what if your system had one user profile with hundreds of invalid sign on attempts? Consider the system in our study with 516,772 invalid sign on attempts. Three, five, or even ten attempts are probably the sign of a frustrated user. Larger numbers could indicate an intrusion attempt. Numbers like 1,000, 15,000, or 700,000 are probably a sign of a broken application that doesn’t have a built-in mechanism to identify invalid attempts. The risk level increases significantly if the offending profile is determined to be, for example, QSECOFR, and is not disabled automatically, or if the security team has no way to be notified of failed access attempts in a timely manner. It is worth noting that one of the opt-out compliance assessments reported 6.9 million sign on attempts against one single profile. The obvious concern over this startling and repetitious sign on activity is over-shadowed only by the fact that the organization was totally unaware of it. “The PCI standard requires a minimum password length of at least 7 characters for compliance.”
  • 12. 2013 State of IBM i Security Study p. 12 The PowerTech Group www.powertech.com • info@powertech.com Figure 7 shows the action taken when the maximum number of allowed sign on attempts is exceeded. In 87% of cases, the profile is disabled and this is recommended. When using named devices (as opposed to virtual device names) the recommendation is expanded to include disablement of the device description. It is not recommended to disable virtual devices as the system typically creates a new device when the user reconnects. FIGURE 7: DEFAULT ACTION FOR EXCEEDING INVALID SIGN ON ATTEMPTS Control Defect: Overall, the results show that password management procedures are weak and many user IDs are vulnerable to identity theft. Figure 3: Powerful Users, shows that there are an unacceptably high number of powerful user profiles. What happens if a hacker or a disgruntled employee finds his or her way into an account with *ALLOBJ authority? Relevant COBIT Objectives: DS5.3 Identity Management DS5.4 User Account Management Data Access On non-IBM i servers, users who are not granted permission to an object or task have no authority. With IBM i, this is not the case. Unless the user is granted a specific authority—granting or denying access—then the user will be granted the default permission. This isn’t a problem unless we discover that the default authority provides permission for a user to invoke a program and to read, change, and even delete data from a file.
  • 13. 2013 State of IBM i Security Study p. 13 The PowerTech Group www.powertech.com • info@powertech.com To reduce the risk of unauthorized program changes and database alterations, auditors recom- mend that users should not be authorized to read or change production databases or source code without a proven business requirement. In this study, PowerTech uses the *PUBLIC access rights to libraries as a simple measurement indicating how accessible IBM i data would be to the average end user. Figure 8 details the level of access that *PUBLIC has to libraries on the systems in our study. If *PUBLIC has at least *USE authority to a library, anyone who can log in to the system can get a catalog of all objects in that library. Once a user gains access to a library, they may be able to access the objects in the library. They may even be able to delete objects from the library if they possess the necessary authority to the specific object. *USE authority to a file means any user with FTP access can download (read) the data. The FTP GET function or ODBC operations in tools like Microsoft Excel allow even a novice end user to access your data. *CHANGE authority to a library allows the user to place new objects in the library and to change some of the library characteristics. *ALL access allows anyone on the system to manage, rename, specify security for, or even delete a library (if they have delete authority to the objects in the library). FIGURE 8: *PUBLIC AUTHORITY TO DATA Our findings demonstrate that IBM i shops still have far too many libraries accessible to the average user. The statistics for DB2 libraries indicate a lack of adequate control over the data, which often includes critical corporate financial information. The method used to determine what authority *PUBLIC will have to newly created files and programs typically comes from the library’s Default Create Authority (CRTAUT) parameter.
  • 14. 2013 State of IBM i Security Study p. 14 The PowerTech Group www.powertech.com • info@powertech.com Figure 9 indicates that 17% of libraries reviewed have Default Create Authority set to *USE, *CHANGE, or *ALL. However, more than 80% of libraries deferred the setting to the QCRTAUT system value (*SYSVAL). Figure 9A extends the library level assignment of *SYSVAL and reflects that the system value typically remains at the shipped default of *CHANGE. In fact, not even a single system has been configured to enforce the least-access requirement of common regulatory standards such as PCI. This means that when new files and programs are created on these systems, the average user automatically has change rights to the vast majority of those new objects. On these systems, when anyone creates a new file in one of these libraries, *PUBLIC has the authority to read, add, change, and delete data from the file. *PUBLIC also can copy data from, or upload data to, the file, and even change some of the object characteristics of the file. FIGURE 9: DEFAULT CREATE AUTHORITY BY LIBRARY Control Defect: Overall, these results show that virtually every system user has access to data far beyond their demonstrated need. Auditors typically look to ensure that the company has adequate separation of duties and appropriate controls in place to enforce the separation of duties. Relevant COBIT Objective: DS5.4 User Account Management FIGURE 9A: *SYSVAL PROPERTIES
  • 15. 2013 State of IBM i Security Study p. 15 The PowerTech Group www.powertech.com • info@powertech.com Network Access Control And Auditing Over the years, IBM has extended the power of IBM i by adding tools that allow data to be accessed from other platforms, especially PCs. Well-known services such as FTP, ODBC, JDBC, and DDM are active and ready to send data across the network as soon as the machine is powered on. Any user with a profile on the system and authority to the objects, can access critical corporate data on your Power Systems server. Even when administrators do not purposely install data access tools on users’ PCs, end users can access data using free tools downloaded from the internet or tools that are included with other software loaded on their PCs. For example, Windows comes with FTP client software that easily sends or retrieves data from an IBM i server. Worse yet, the results from the Data Access area indicate that object-level authority is poorly implemented on most systems. The combination of open access rights to data, overly powerful users, and convenient tools to access the data from a PC, is a perfect storm of IBM i security exposures. Beyond data access, some TCP services permit the execution of server commands. The easily- accessed FTP service enables commands to be run by all users—even those without command line permission on their profile. This is still a shock to many system administrators and unknown to many managers and auditors. The statistics in Figure 10 show that REXEC is often not automatically started but that FTP is almost always active and listening. FIGURE 10: REXEC AND FTP AUTOSTART FTP AUTOSTARTED? REXEC AUTOSTARTED?
  • 16. 2013 State of IBM i Security Study p. 16 The PowerTech Group www.powertech.com • info@powertech.com To reduce this serious exposure, IBM provides interfaces known as exit points that allow admin- istrators to secure their systems. An exit program attached to an exit point can monitor and restrict network access to the system. IBM i shops can write their own exit programs or pur- chase packaged software to accomplish this task. Without exit programs in place, IBM i does not provide any audit trail of user activity originating through common network access tools such as FTP and ODBC. An exit program should have two main functions: to audit access requests and to provide access control that augments IBM i object-level security. The study assumes that all designated exit programs satisfy all of these minimum requirements. PowerTech reviewed 27 different network exit point interfaces on each system to check wheth- er an exit program is registered. Only 31% of the systems have any exit programs in place that could potentially log and control network access (Figure 11). Even on the systems with exit programs, coverage is often incomplete. Of the 31% of systems with programs in place, 10% have only 1 registered exit program and only 6% have programs registered to all of the network access exit points. The most common exit point covered is ODBC (for initial connection only), followed by FTP Server. FIGURE 11: EXIT PROGRAMS IN PLACE Users with Command Line Access The traditional way to control access to sensitive data and powerful commands was to limit command line access for end users. And in the past, this method was effective. “Without exit programs in place, IBM i can’t audit user activity through network access tools such as FTP and ODBC.”
  • 17. 2013 State of IBM i Security Study p. 17 The PowerTech Group www.powertech.com • info@powertech.com In addition to configuring the user profile with limited capabilities, application menus controlled how users accessed data and when they had access to a command line. However, as IBM allows new interfaces and remote commands, this approach isn’t as sound as it used to be. According to our 2013 results, 29% of users have command line access through traditional menu-based interfaces. Of those 317 users, we found that 18% of the profiles are enabled. Several network interfaces do not acknowledge the command line limitations configured in a user profile and must be controlled in other ways. This means that users can run commands remotely, even when system administrators have purposely taken precautions to restrict them from using a command line. Control Defect: Based on the broad *PUBLIC authority demonstrated in the Data Access area, anyone on these systems can access data, commands, and programs without the operating system keeping a record. Even companies that have installed exit program solutions to protect their data frequently neglect some of the critical access points. It appears that many companies in the IBM i community are dangerously unaware of the wide-open network access problem. The lack of monitoring and control of network access is a serious deficiency in many shops. Relevant COBIT Objectives: DS5.4 User Account Management DS5.5 Security Testing, Surveillance, and Monitoring System Auditing One of the significant security features of IBM i is its ability to log important security-related events into a tamper-proof repository. However, 12% of the systems reviewed are not using the audit journal (Figure 12, opp. page), indicating a very low level of scrutiny. These systems are unable to review recent history to determine the source of critical security events, such as: • Who deleted this file? • Who gave this user *ALLOBJ authority? Although 88% (IBM i servers auditing their systems) is the best number we have seen in recent years, there remains inconsistency in the types of events that are audited. Some configurations suggest that auditing has been activated by High-Availability (HA) applications that must replicate events to back up systems. Audit event types such as *AUTFAIL (Authority Failures) are not required in an HA infrastructure and often identify that customers are not using the auditing facility for security purposes.
  • 18. 2013 State of IBM i Security Study p. 18 The PowerTech Group www.powertech.com • info@powertech.com When the Security Audit Journal is activated, the volume of data it contains is often so large and the contents so cryptic, that most IT staff have trouble monitoring the logged activity with the tools available in the operating system. A few software vendors provide auditing tools that report on and review the system data that’s written to the Security Audit Journal. But, only 27% of the systems in the PowerTech study have a recognizable tool installed. Companies today are overwhelmed by the amount of reporting required to demonstrate compliance with regulations such as Sarbanes-Oxley (SOX) and the Payment Card Industry Data Security Standard (PCI DSS), yet it appears that very few of them take advantage of the tools that are available to automate and simplify reporting tasks. FIGURE 12: SYSTEMS USING THE IBM i AUDIT JOURNAL Control Defect: On most of the systems surveyed, security violations could occur undetected. Companies that use the Security Audit Journal are in a far better position than those that don’t because, at any time, they can use an automated tool to sift through and interpret the audit journal entries. Given the voluminous amounts of raw data that is collected in the IBM Security Audit Journal, it’s not realistic to expect system administrators to manually review the logs regularly. The job of filtering and analyzing massive amounts of complex raw data requires software tools. A software auditing tool reduces the costs associated with compliance reporting and increases the likelihood that this work will get done. Relevant COBIT objectives: DS5.5 Security Testing, Surveillance, and Monitoring “The absence of the Security Audit Journal indicates a very low level of security.”
  • 19. 2013 State of IBM i Security Study p. 19 The PowerTech Group www.powertech.com • info@powertech.com Conclusion IBM Power Systems have long been perceived as one of the most secure platforms available. But experts agree that IBM i security is only as effective as the policies, procedures, and configurations put in place to manage it. This study highlighted a number of common security exposures and configuration management practices that must be addressed to protect the data on IBM i systems. The study demonstrated that all organizations could improve the IT controls on their IBM i server. In particular, there are six critical areas that warrant immediate inspection and action: 1. Powerful User Profiles—The control defect most readily recognized by both executives and IT professionals is the unbridled and unmonitored power that some users have over system applications and data. Auditors routinely cite this lack of control when auditing for separation of duties in IBM i shops. Recommendations: • Document and enforce separation of duties for powerful users. Avoid having any one all-powerful user, all the time. • Monitor, log, and report on the use of powerful authorities. Be prepared to justify the use of powerful authorities to auditors and managers. • Implement a solution, such as PowerTech Authority Broker,™ to automatically monitor, control, and audit users who need access to higher levels of authority. • Monitor and secure the use of sensitive commands. PowerTech Command Security™ can prevent unauthorized users from executing a monitored command. 2. User and Password Management—The integrity of user IDs and passwords is a critical component of secure system access. Experienced system managers know that a little bit of attention here can go a long way toward keeping systems secure. Recommendations: • Review user accounts on a regular basis to assure that each user’s access is appropriate to their job responsibilities. Automating this step is essential if it is to become a regular part of operations. PowerTech Compliance Monitor™ makes it easy to generate audit reports on a regular basis that compare IBM i user and password information against policy. • Use a profile management solution to maintain consistency of your user profiles across systems. PowerTech PowerAdmin™ uses a template-based approach to manage user profiles from a central management system.
  • 20. 2013 State of IBM i Security Study p. 20 The PowerTech Group www.powertech.com • info@powertech.com • Establish and enforce password policies that make it difficult to compromise a user’s account. • Use IBM i system values that make passwords more difficult to guess. • Eliminate passwords entirely by implementing a Single Sign On (SSO) solution based on the Enterprise Identity Mapping (EIM) technology that is included in the operating system. 3. Data Access—System managers require better processes and tools to monitor and control access to IBM i data. Recommendations: • Use the security capabilities of the IBM i OS. Where possible, secure data using resource- level security to protect individual application and data objects. • When it is not possible, or practical, to protect data with resource-level security, use exit program technology to regulate access to the data. PowerTech Network Security™ is the industry’s leading off-the-shelf exit program solution. • Monitor changes to your database information. PowerTech DataThread™ creates before- and-after snapshots of database changes and requires users to sign for changes, so you can meet compliance requirements. • Investigate how well your third-party software suppliers use operating system resource level security. Seek assistance from the vendor in protecting application objects. • Ensure that application libraries are secured from general users on the system. (Set the System Value and Library values for Default Create Authority to the most restrictive setting [*EXCLUDE].) 4. Network Access Control and Auditing—This is nonexistent in most IBM i shops, so both authorized and unauthorized access occurs without accountability or traceability. IBM’s exit point technology provides the ability to control and monitor network data access. However, the study indicates that the adoption rate of exit points has not kept pace with the adoption rate of network data access utilities. Recommendations: • Implement exit programs using PowerTech Network Security to monitor and control users’ access through network interfaces such as ODBC and FTP. • Review network data access transactions for inappropriate or dangerous activity. • Establish clear guidelines for file download and file sharing permissions. • Remove default DB2 access in tools like Microsoft Excel and IBM i Access (Client Access).
  • 21. 2013 State of IBM i Security Study p. 21 The PowerTech Group www.powertech.com • info@powertech.com 5. System Auditing—Given the volume of security-related transactions that occur on a system in a typical day, tools are essential to quickly find the information that deserves your attention. Recommendations: • Use the IBM-supplied Security Audit Journal (QAUDJRN) to ensure that important events are recorded in a non-alterable log. • Implement PowerTech Compliance Monitor to simplify the task of reviewing audit logs for relevant events such as object deletions, user ID promotions, and system value changes. • Implement PowerTech Interact™ to include IBM i security data into your Security Informa- tion & Event Management (SIEM) solutions that support ISS, CEF, or SYSLOG formats. 6. System Security Values—System values regulate how easy or difficult it is for an outsider to use or abuse your system. Poorly configured or unmonitored system values are an unacceptable security risk. Organizations that are unsure of the potential impact may want to consult with IBM i security professionals before making changes, but a solution should be applied quickly. Recommendations: • Define and implement a security policy that incorporates the most secure settings your environment will tolerate. (Seek professional expertise if you are unsure of the impact of certain settings.) • Download PowerTech’s free Open Source Security Policy to help you get started defining your own policy. • Run the System Values reports and scorecards in PowerTech Compliance Monitor on a regular basis to ensure that your system settings match your policy.
  • 22. 2013 State of IBM i Security Study p. 22 The PowerTech Group www.powertech.com • info@powertech.com Appendix I: COBIT Organizations that start security projects quickly discover that legislation is vague when it comes to IT security issues. Legislation seldom gives specific actionable recommendations and never mentions specific platforms like Power Systems running IBM i. Where should you look when evaluating your business-critical servers? For SOX, the U.S. Securities and Exchange Commission (SEC) has ruled that management must evaluate the company’s internal controls over financial reporting using an acceptable, recog- nized control framework. This requirement for frameworks also applies to the Information Technology (IT) arms of the organization. Some of the best known standards are COBIT, ISO 27002, and ITIL. While there is no “golden standard,” most large audit firms now use COBIT as a generally accepted standard for IT security and internal control practices. Several of the COBIT objectives that are relevant to security compliance on IBM i servers are outlined here: DS5.3 Identity Management Ensure that all users (internal, external, and temporary) and their activity on IT systems (business application, IT environment, system operations, development and maintenance) are uniquely identifiable. Enable user identities via authentication mechanisms. Confirm that user access rights to systems and data are in line with defined and documented business needs and that job requirements are attached to user identities. Ensure that user access rights are requested by user management, approved by system owners and implemented by the security responsible person. Maintain user identities and access rights in a central repository. Deploy cost-effective technical and procedural measures, and keep them current to establish user identification, implement authentication and enforce access rights. DS5.4 User Account Management Address requesting, establishing, issuing, suspending, modifying, and closing user accounts and related user privileges with a set of user account management procedures. Include an approval procedure outlining the data or system owner granting the access privileges. These procedures should apply for all users, including administrators (privileged users) and internal and external users, for normal and emergency cases. Rights and obligations relative to access to enterprise systems and information should be contractually arranged for all types of users. Perform regular management review of all accounts and related privileges. DS5.5 Security Testing, Surveillance, and Monitoring Test and monitor the IT security implementation in a proactive way. IT security should be reaccredited in a timely manner to ensure that the approved enterprise’s information security baseline is maintained. A logging and monitoring function will enable the early prevention and/ or detection and subsequent timely reporting of unusual and/or abnormal activities that may need to be addressed.
  • 23. 2013 State of IBM i Security Study p. 23 The PowerTech Group www.powertech.com • info@powertech.com PO2.3 Data Classification Scheme Establish a classification scheme that applies throughout the enterprise, based on the criticality and sensitivity (e.g., public, confidential, top secret) of enterprise data. This scheme includes details about data ownership, definition of appropriate security levels and protection controls, and a brief description of data retention and destruction requirements, criticality, and sensitiv- ity. It should be used as the basis for applying controls such as access controls, archiving, or encryption. Appendix II: PowerTech Solutions As the leading expert in IBM i security, PowerTech has developed an extensive line of powerful solutions designed to address shortcomings in the operating system, provide advanced func- tionality in access control and auditing, and ease the cost and burden of maintaining regulatory compliance. Table 2 outlines the available security modules and their purpose. TABLE 2: POWERTECH’S COMPREHENSIVE SUITE OF SECURITY SOLUTIONS Custom auditing and reporting Access control by exit programs Management of privileged users Real-time security reporting Real-time database monitoring Command monitoring and control Centralized user profile management
  • 24. TEL USA: +1 253-872-7788 TOLL FREE: +1 800-915-7700 TEL UK: +44 (0) 870 120 3148 The PowerTech Group www.powertech.com • info@powertech.com Copyright 2013. PowerTech is a registered trademark of Help/Systems, LLC. AS/400 and System i are registered trademarks of IBM. All other product and company names are trademarks of their respective holders. C051SS3 About the Study Authors PowerTech is the leading expert in automated security solutions for IBM Power Systems servers, helping users manage today’s compliance regulations and data privacy threats. Our security solutions are designed to save your valuable IT resources, giving you ongoing protection and peace of mind. Because Power Systems servers often host sensitive corporate data, organizations need to practice proactive compliance security. As an IBM Advanced Business Partner with over 1,000 customers worldwide, PowerTech understands corporate vulnerability and the risks associated with data privacy and access control. PowerTech security solutions are the corporate standard for IBM i security at many major international financial institutions. PowerTech is a division of Help/Systems, LLC and maintains its corporate headquarters in Eden Prairie, Minnesota. Founded in 1996 by security experts, PowerTech has demonstrated a proven commitment to the security and compliance market and leads the industry in raising awareness of IBM i security issues and solutions. • PowerTech is a member of the PCI Security Standards Council, a global open standards body providing guidance to the Payment Card Industry Data Security Standard. PowerTech works with the council to evolve the PCI DSS and other payment and data protection standards. • PowerTech is a member the IBM i Independent Software Vendor (ISV) council. • PowerTech publishes an Open Source Security Policy for IBM i as a part of its mission to promote awareness of common security challenges and ensure the integrity and confi- dentiality of IBM i data. • PowerTech is authorized to issue continuing professional education (CPE) credits for IBM i security education by the National Association of State Boards of Accountancy, Inc. (NASBA).