94
© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners 1 GETTING STARTED WITH IBM I SECURITY Rev: 09/13/12 Welcome

Getting Started with IBM i Security

Embed Size (px)

Citation preview

Page 1: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners1

GETTING STARTED WITH

IBM I SECURITY

Rev: 09/13/12

Welcome

Page 2: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners2

Your Presenter

ROBIN TATAM, CISM

Director of Security Technologies

952-563-2768

[email protected]

Page 3: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners3

Within 5 years, the amount of data stored

worldwide will grow by

4,300%

Did You Know…

Page 4: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners4

80%of that growth will be on enterprise

servers like yours.

Did You Know…

Page 5: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners5

— Colin Parris

The world is already swimming in

8 zettabytes (ZB) of datacollected from more than a trillion mobile

endpoints on the “internet of things.”

Did You Know…

Page 6: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners6

What Is a Zettabyte?

Page 7: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners7

Ask yourself…

o How will this impact your Power Server?

o Do you have the proper tools to manage this growth?

o How do you go about securing this data in a liveenvironment?

o How do you address data usage?

o Who is using the data and why?

o How can you keep your servers compliant?

Big Data and Your Data Center

Page 8: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners8

In The Blue Corner…

Security vs. Compliance

Page 9: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners9

Security

A state of being whose ultimate objective is to prevent unauthorized

or undesired activity

Security vs. Compliance

Page 10: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners10

Compliance

The adherence to a stated policy or standard

Security vs. Compliance

Page 11: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners11

Warning: You can be fully complianteven if the policy or standard does not outline desirable practices!

Security vs. Compliance

Policy:• Don’t audit• Allow any user to modify data• Permit data to be taken home

Page 12: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners12

The primary goal of a compliance standard is to act as a guideline to help maintain an acceptable level of operating procedures and security.

Regulations are:

– Not a precise technical roadmap

– Have to be interpreted

– Often outline a basic minimum

Security vs. Compliance

Page 13: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners13

Businesses rely on auditors to be interpreters.

Unfortunately, many don’t speak the ‘i’ language.

4.3.2 Privilegedaccount access should…

Don’t grantend users *ALLOBJ

Security vs. Compliance

Page 14: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners14

Okay SOX, whatshould I set my

system values to?!

Regulations don’t usually speak ‘technology’, and certainly don’t speak ‘i’.

Security vs. Compliance

Page 15: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners15

Far too many organizations approach compliance as the sole objective without seeing the value to their security.

Security vs. Compliance

What’s the least I can doand still be able to check

the box to say I did it?

Page 16: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners16

Unfortunately, the fact that most organizations have to invest so much to achievecompliance shows how our security has fallen short.

Make security your objective; compliance will often takecare of itself.

Security vs. Compliance

Page 17: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners17

Do you have your ownregulatory directive?

Security vs. Compliance

Page 18: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners18

Maybe you say NO!as you don’t have to deal with

PCI, HIPAA, SOX, GLBA, BASEL II, etc.

Security vs. Compliance

Page 19: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners19

Buteveryone

should have one

Security vs. Compliance

Page 20: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners20

It’s called a

security policy

Security vs. Compliance

Page 21: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners21

How susceptible is myIBM Power Systems

server to attack?

“I was assured this server was secure!”

Why Do We Care? We’re On Power Systems!

Page 22: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners22

Page 23: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners23

The IBM ioperatingsystem is secure

Why Do We Care? We’re On Power Systems!

Page 24: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners24

Why Do We Care? We’re On Power Systems!

Page 25: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners25

The IBM ioperatingsystem is secure

Why Do We Care? We’re On Power Systems!

Page 26: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners26

The IBM i operatingsystem is highly securable

Why Do We Care? We’re On Power Systems!

Page 27: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners27

Secure Securable

A Common Misconception

Page 28: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners28

But are you using them?

IBM i contains numerous world-class security features!

A Common Misconception

Page 29: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners29

PowerTech uses anonymous audit data from our Compliance Assessment tool to compile an annual study of security statistics.

This study (available online) provides a picture of what IBM i shops are currently doing with their security controls.

And, year after year, it shows that there is definitely still room (and a need) for improvement!

(The study sample consists of security-aware environments.)

This Popular Document Suggests Most People Aren’t!

Page 30: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners30

QSECURITY: System Security Level

Page 31: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners31

Who’s Using the Audit Journal?

Page 32: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners32

Library Authority

Page 33: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners33

In the 1990s, IBM supplemented Object Level security with a suite of exit points,which are temporary interruptions in anOS process in order to invoke a user-written program.

The function of an exit program for network access can be anything–but security officers typically want it to:

• Audit (as IBM doesn’t)• Control (as good object security is often

lacking)

It then has to return a pass/fail to the exit point.

A New Function of IBM i

Page 34: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners34

Exit Point Coverage

Page 35: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners35

Exit Point Coverage

Page 36: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners36

ProgrammersClaim they need *ALLOBJ authority to fix production applications

System AdministratorsClaim they need *IOSYSCFG authority to configure and change the system

OperatorsClaim they need *JOBCTL, *SPLCTL, and *SAVSYS to IPL and do backups and other specialized functions

VendorsCan’t imagine running without Security Officer rights

Powerful Users

Page 37: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners37

END USER # 427

Oh, and Let’s Not Forget…

Page 38: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners38

Limit Capabilities *NO

User Class *PGMR

Initial Menu QSYS/MAIN

Special Authorities: *ALLOBJ, *JOBCTL

IBM Navigator for i

END USER # 427

Hackers Aren’t The Only Threat

Page 39: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners39

Endless Examples of Insider Breaches

Page 40: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners40

IBM i uses three main user entities:

1. User Profile

This is what we typically think of as a “user”

2. SST/DST UserA user of low-level system admin tools

3. Validation List UsersMaintained by applications (e.g., HTTP users)

User Profiles

Page 41: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners41

User Profiles are objects of type *USRPRF.

They define each user’s capabilities, defaultenvironment settings, and resource authority.

IBM supplies a number of profiles with the system− basic ones, and others associated with licensed products (e.g., QSECOFR, QBRMS).

User Profiles

Page 42: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners42

A profile/password is thebiggest hurdle you can putbetween a person and yourcorporate data—so makeit count!

Don’t ever assume “my users could not/would not (know how to) do that”—you already gave them a valid login.

General Requirements

Page 43: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners434

3

Mistakes Are Made

Page 44: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners44

Date: September 1, 2004 12:49pmAuthor: R. H.Subject: Oops!

HELP!!! I've accidentally deleted program QCMD inQSYS (spelling error using DLTPGM). The system has crashed. Any suggestions? I assume anIPL will be required, but is there anything else thatcan be suggested? This is bad.

A posting at iSeriesNetwork.com

*%#!, Now What Do I Do?!

Page 45: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners45

How did this user fix this issue?

a) Restore the deleted object

b) Restore the operating system

c) IPL and reinstall the entire OS from media

*%#!, Now What Do I Do?!

Page 46: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners46

How did this user fix this issue?

a) Restore the deleted object

b) Restore the operating system

c) IPL and reinstall the entire OS from media

*%#!, Now What Do I Do?!

Page 47: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners47

The #1 issue citedby auditors is:

Control and monitoring of powerful users

Auditors Are In Agreement

Page 48: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners48

Auditors Are In Agreement

What defines a powerful user?

1. Carry one or more special authorities

2. Granted private authority

3. Access to a system withpermissive public accessto production data

PLUS the ability to execute commands

Page 49: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners49

User Class

Five templates exist to classifybased on common types of users:

*SECOFR Security Officer

*SECADM Security Administrator

*SYSOPR System Operator

*PGMR Programmer

*USER User

User Settings

Page 50: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners50

User Class

Each template controls IBM menu options and default special authority assignment:

*ALLOBJ *SECADM *IOSYSCFG *AUDIT *SPLCTL *SERVICE *JOBCTL *SAVSYS

*SECOFR

*SECADM

*SYSOPR

*PGMR

*USER

User Settings

Page 51: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners51

• IBM provides a custom resource—the Security Audit Journal—for recording security-related events.

• Consider setting up a profile with *AUDIT special authority specifically to maintain the auditing controls.

• Events are recorded to the audit journal based on the configuration of audit controls—system, user, object.

• The operating system does not come with a security audit journal; you have to create it before you can start auditing.

The Security Audit Journal

Page 52: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners52

Who’s Using The Audit Journal

Page 53: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners53

• First, create a library to contain the audit journal receivers:

CRTLIB LIB(SECJRNLIB) TEXT(‘Security Journal Library’)

• This allows you to secure the contents, and makes it easier to manage audit data.

The Security Audit Journal

Page 54: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners54

• The Security Audit Journal must be called QAUDJRN and it must reside in the QSYS library.

• Although you can create the components and set the system value controls manually, most people prefer to use the Change Security Auditing (CHGSECAUD) command to pull all the components together.

The Security Audit Journal

Page 55: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners55

QAUDCTL – Auditing Control

• This system value acts as an on/off switch to activate the auditing function:

– Specify *NONE to turn auditing OFF

– Specify *AUDLVL to turn auditing ON

• Other recommended options include:

– *OBJAUD—enables object-level auditing

– *NOQTEMP—instructs the system to ignore activities in a job’s QTEMP temporary library

Starting To Audit

Page 56: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners56

Auditing Values

• This parameter corresponds to the QAUDLVL system value, and its overflow companion QAUDLVL2.

• Use this value to designate what system-level activities you want to audit.

• A special value of *DFTSET translates to the following values:

*AUTFAIL, *CREATE, *DELETE, *SECURITY, *SAVRST

Starting To Audit

Page 57: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners57

In IBM i 7.2, 18 categories are available for system-wide auditing. Three of these allow you to further customize them (indicated by italics).

*ATNEVT Attention Event

*AUTFAIL Authority Failure

*CREATE Object Creations

*DELETE Object Deletions

*JOBDTA Actions Affecting Jobs (*JOBxxx)

*NETCMN Network Communications (*NETxxx)

*OBJMGT Object Management

*OPTICAL Optical Drive Operations

Starting To Audit

Page 58: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners58

Starting To Audit

*PTFOBJ Changes to PTF Objects

*PTFOPR PTF Operations

*PGMADP Program Adoptions

*PGMFAIL Program Failure

*PRTDTA Print Data

*SAVRST Save and Restore Operations

*SECURITY Security Operations (*SECxxx)

*SERVICE Service Functions

*SPLFDTA Spooled File Functions

*SYSMGT System Management

Note: All values, except *ATNEVT, can be specified for individual users.

Page 59: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners59

Auditing a User Profile

Page 60: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners60

• In addition to system-wide auditing, you can audit specific user activities.

• Turn on user auditing using the Change User Auditing (CHGUSRAUD) command.This is distinct from the normal profile commands (for separation of duties).

• User auditing works with object-level auditing to audit specific objects when they are accessed by audited users.

• In addition to QAUDLVL values, an extra option (*CMD) is available for select user-profile auditing.

Auditing a User Profile

Page 61: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners61

Auditing an Object

Page 62: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners62

• The operating system allows you to audit access tospecific objects.

• Object auditing works with user-level auditing to audit specific objects when they are accessed by audited users.

• Turn on object auditing using the Change Object Auditing (CHGOBJAUD) command after you specify *OBJAUD in the QAUDCTL system value.

• Specify either *ALL or *CHANGE to audit file opens, or file-open-for-change requests.

Auditing an Object

Page 63: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners63

• Specify *USRPRF to have the operating system check the user profile’s OBJAUD value to determine if object auditing is required, and what operations (Read/Change) to record.

NOTE: This is an object-level operation and does NOT audit data changes. Database journaling is required for record/field auditing.

• To audit an object in the IFS, follow the same procedure, but use the Change Auditing Value (CHGAUD) command.

Auditing an Object

Page 64: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners64

To Audit New Objects

A new object inherits its auditing value from the CRTOBJAUD library attribute where it resides.

If the library has a value of *SYSVAL, the value is inherited from the QCRTOBJAUD system value (default of *NONE).

CAUTION: Changing the QCRTOBJAUD system value could generate a potentially large number of auditing events.

Auditing an Object

Page 65: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners65

Source:IBM i and i5/OS

Security & Compliance:A Practical Guide

29th Street Press

Will It Be Audited?

Page 66: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners66

• Some actions originating from the network may not be recorded by native auditing controls.

• If objects are being audited, or a user performs an audited action (for example, deleting an object), that access is tracked.

• Common network actions include ODBC and FTP.

• Consider using an exit program to ensure control and auditing of these types of transactions.

Auditing Network Access

Page 67: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners67

• To see if you have exit programs in place, reviewthe system registry, use the WRKREGINF command,or use PowerTech’s FREE Compliance Assessment tool.

Auditing Network Access

Page 68: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners68

• After auditing is configured andactively collecting, review how toextract the audited information.

• Download the Security Reference manual to see detailed informationabout QAUDLVL values, the AUDLVLvalue from user profile auditing, and the layout of audit journal data.

• All journal entries contain basic information (date, time, user, job information, and the entry type code), followed by entry-specific data.

Working With The Audit Journal

Page 69: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners69

There are 3 main options to display or print audit journal data:

1. Display Audit Journal Entry (DSPAUDJRNE)

Simplified version of the DSPJRN command with parameters specific for most entries in the security audit journal (no longer updated by IBM)

Does not support IFS events (requires DSPJRN)

Cannot sort or query data (only screen and sending output to a spooled file are supported)

Working With The Audit Journal

Page 70: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners70

Working With The Audit Journal

Page 71: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners71

Working With The Audit Journal

Page 72: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners72

2. Display Journal (DSPJRN)

Basic way to review activities in (any) journal

Requires an understanding of the format of the journal data; data is not parsed by the command

Supports the name of IFS objects

Helps if you have an exact timestamp as DSPJRN does not sort the data

Working With The Audit Journal

Page 73: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners73

3. Copy Audit Journal Entry (CPYAUDJRNE)

Combines the DSPJRN command with copying the data to an output file

The output file layout is based on the entry code

Extracted data can be queried, for sorting and printing

Default output file name is QAUDITxx where xx is the audit type code

Working With The Audit Journal

Page 74: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners74

Consider Reviewing the Following Journal Type Codes

AF Authority Failures

CP Profile Activities (Create/Change)

Password Changes

SV System Value Changes

PW Invalid Passwords

Working With The Audit Journal

Page 75: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners75

For User Auditing

CD Command Executed

For Object Auditing

ZC Object Changed

ZR Object Read

Working With The Audit Journal

Page 76: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners76

Archiving

• Check with your legal department for retention information. Attorneys and auditors may have to defend the information in court, so give them what they need.

• If you do not have legal support, consider 30+ days online, and unrestricted offline (PCI regulations require 90 days online, and 1 year offline).

Working With The Audit Journal

Page 77: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners77

‘i’ can contract a virus!

Long thought to be immune to the virus threat, IBM i can act as the source of virus problems on your network.

Virus activity can be discovered on:

• Mapped Drives• FTP• Image Catalogs• Backup Tapes• High Availability

A Common Myth: IBM i has Viral Immunity

Page 78: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners78

“Security by obscurity”is no longer a good option…

Of course, it never really was!

v

Hacking for Dummies?

Security By Obscurity

Page 79: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners79

What’s integrated?

– Intrusion Detection System (IDS)

– Support for Role-Based Access (RBAC)

– Object-level security

– Event auditing

– Operating system integrity protection

– Security exit points

What Comes Free (or Cheap)?

Page 80: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners80

What else is needed?

– Security exit programs

– User provisioning and management

– Real-time audit notification

– Database monitoring

– Audit and compliance reporting

– Anti-virus software

What Upgrades Are Available?

Page 81: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners81

Education!

• Read the current “State of IBM i Security” study

• Research security topics through articles and white papers

• Attend security workshops and webinars (CONGRATS!)

• Download the IBM Security Reference Manual

• Use Google!

Getting a Grip

Page 82: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners82

Mitigation!

• Evaluate current security infrastructure

• Establish baseline system values

• Consider object-level security

• Augment security with exit programs

• Activate event auditing

• Set up audit reporting schedule for configuration settings

• Enable temporary privilege escalation

Getting a Grip

Page 83: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners83

• Data is secured by out-of-date methods (if at all).

• Management assumes data is secured as no one is advising them otherwise.

• Regulatory demands are the primary catalyst of change.

The Past and The Present

Page 84: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners84

• More regulatory mandates trying to stem data loss.

• Businesses will be called upon to react faster using more calculated methods.

• Potential for corporate and consumer ”breach fatigue.”

The Future

Page 85: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners85

Do NO thing

The Worst Plan

Page 86: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners86

Take ACT ion

The Best Plan

Page 87: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners87

• IT Security has (but has to keep) executive attention

– This is the best opportunity to solve long-standing problems

– Gain management approval now

– Fight symptoms of “breach fatigue”

• Control users with broad authority to production data

– Leaving users unchecked is both an audit exception and an accident waiting to happen

– Don’t accept that powerful users have to be limitless

• Limit the use of—and necessity for—powerful profiles

– Monitor and report when power is used

Summary

Page 88: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners88

• SECURITY and COMPLIANCE are not the same

• IBM i ships in an “allow-all” configuration and CORRECTIVE ACTION must be taken to move to a “deny-all” configuration

• OS and tooling should play COMPLEMENTARY ROLES

• RISK is reduced; never totally eliminated

– Learn from other company’s experiences

Summary

Page 89: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners89

How Can PowerTech Help Us?

Page 90: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners90

6 categories of review

Completes in under 5 minutes

Includes executive summary

Accompanied by live review and Q&A

Personalized recommendations

7-day grace period

FREE!

Option 1 — Rapid Vulnerability Scan

Page 91: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners91

System Auditing Controls

Unsecured Profiles

Public Authorities

Password Policy

Administrative Rights

Analyzed by Certified Auditor

100+ Pages with Detailed Explanations

Option 2 — Deep Dive Assessment

Page 92: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners92

Familiarize yourself with the Ponemon Institute.

Perform cost analysis of a breach:• Forensic analysis• Notification• Lawsuits• Loss of customer confidence• Corporate embarrassment• Suspension of ability to trade• Lowered business valuation• Jail terms

A significant breach can be a enterprise killer!

Additional Steps for Cost Justification

Page 93: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners93

Visit PowerTech online to access:

www.helpsystems.com/powertech

• State of IBM i Security Study

• Online Compliance Guide

• Open source security policy

• Articles

• Webinars/educational events

• White papers

• PowerNews monthly e-newsletter

• Security solution datasheets

Free Online Resources

Page 94: Getting Started with IBM i Security

© 2014 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners94

Thank You For Joining Us

ROBIN TATAMDirector of Security Technologies

(952) [email protected]

www.helpsystems.com/powertech