- JD Edwards
- IBM i / AS400
- Support Services
Overall AS/400 security starts with the user, and you don't have to have a full-blown security program to make a difference. Start by identifying those items that will have a greater impact with minimal effort and work your way up to those changes that will take more effort.
Security is a personal problem. If people on your team are using weak passwords, reusing passwords, or opening phishing emails, your whole organization could be at risk.
IBM i has eight administrator-level privileges that should be assigned sparingly and monitored vigilantly. IBM recommends that organizations carefully review user roles before assigning special authorities and to keep track of those that have already been granted.
IBM has established 40 as the minimum level required to support a secure system, so be sure your levels meet that requirement. Also be sure IBM i is running an OS that is supported for at least the next two years.
"An unfortunate reality of doing business today is that online security is everyone’s responsibility. Fortunately, even small steps can greatly improve your security."
— Rob Nettgen
IBM i Security Specialist, Briteskies
You know you should be doing more for your AS/400 security, but where do you start? Whether you're addressing internal needs or meeting minimum compliance requirements, every small step counts. Start by asking the questions below.
A compliance plan alone is not enough to safeguard your system, it’s just a component of an overall security policy. Maintaining SOX, J-SOX, HIPAA, GDPR, and PCI compliance is of utmost importance for your organization, but it's not the total picture.
Don't fall victim to believing that because you have a compliance plan in place, you're covered. You need a full security strategy as well, since compliance mandates typically set only minimum requirements.
It's time to take information security seriously, so Briteskies and ALLOut are teaming up to provide end-to-end security solutions for your IBM i system.
Trace Monitoring and Auditing Tool
Trace is a monitoring and auditing system for IBM i that enables you to prove and verify that you have strong internal controls over your database management systems. Security tools included are:
Don't miss this Briteskies and ALLOut Security IBM i webinar replay
Learn how Trace can provide database auditing and identify unauthorized changes or errors in your IBM i data. Trace for IBM i is a notification system that alerts you to potential suspicious behavior on your IBM i. To increase the security of your system, Trace helps you:
People are often in denial that they are a target for an IBM i security breach. But hackers are always looking to exploit vulnerabilities. The “it won’t happen to me” mentality isn’t going to cut it.
Do you have a pressing security challenge or are not sure where to start?
What the smaller guy fails to realize is that a hacker's path to the larger organization may be through him, a smaller, but related company or supplier.
Team Lead for Security Services Delivery, IBM Systems Lab
Our Certified Information Systems Security Professional (CISSP) and IBM i certified specialists are ready to help you become more secure.