11
1 Assessment Comprehensive Analysis of IBM i Security

1 Assessment Comprehensive Analysis of IBM i Security

Embed Size (px)

DESCRIPTION

3 Objectives Set “baseline” for corporate security policies Check compliance with external regulations & baseline corporate security policy Prioritize security efforts Identify security issues before they occur Deliverables User-friendly HTML report covering network access, system auditing, user management, terminal access, password policy, etc. Assessment recommendations based upon security best practices Sample questions answered Who is using FTP (file transfer) to download files? Which application files are being transmitted via the network? Which system value settings are not in accordance with our site’s policies? How many of our users have non-secure passwords? Which user profiles are not being used and should be disabled? Assessment Objectives & Deliverables

Citation preview

Page 1: 1 Assessment Comprehensive Analysis of IBM i Security

1

AssessmentComprehensive Analysis of IBM i Security

Page 2: 1 Assessment Comprehensive Analysis of IBM i Security

2

• In-depth analysis of IBM i security strengths and weaknesses• Pinpoints specific issues & areas requiring attention• Summary and detailed reports produced, grading each aspect of

server security• Detailed explanations provided for each item in report• Provides instant benefit to companies by suggesting “best

practices” recommended values

Assessment Features

Page 3: 1 Assessment Comprehensive Analysis of IBM i Security

3

Objectives• Set “baseline” for corporate security policies• Check compliance with external regulations & baseline corporate security policy• Prioritize security efforts• Identify security issues before they occur

Deliverables• User-friendly HTML report covering network access, system auditing, user

management, terminal access, password policy, etc.• Assessment recommendations based upon security best practices • Sample questions answered

• Who is using FTP (file transfer) to download files?• Which application files are being transmitted via the network?• Which system value settings are not in accordance with our site’s policies?• How many of our users have non-secure passwords?• Which user profiles are not being used and should be disabled?

Assessment Objectives & Deliverables

Page 4: 1 Assessment Comprehensive Analysis of IBM i Security

4

Security Assessment Application

Page 5: 1 Assessment Comprehensive Analysis of IBM i Security

5

Security Assessment Report

Page 6: 1 Assessment Comprehensive Analysis of IBM i Security

6

Security Scores and Recommendations

Page 7: 1 Assessment Comprehensive Analysis of IBM i Security

7

Detailed Analysis and Recommendations

Page 8: 1 Assessment Comprehensive Analysis of IBM i Security

8

Analysis of Users Classes

Page 9: 1 Assessment Comprehensive Analysis of IBM i Security

9

Analyzing Users by Privilege

Page 10: 1 Assessment Comprehensive Analysis of IBM i Security

10

User Profiles as security threats

Page 11: 1 Assessment Comprehensive Analysis of IBM i Security

11

Please visit us at www.razlee.com

Thank You !