• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • iSeries Security Journal Receiver Management, Part 1

    February 8, 2006 Hey, Steve

    We were recently subjected to an audit of our iSeries security practices under the auspices of Sarbanes-Oxley due to the fact that we are a publicly traded company. Believe it or not, it was the first time we had ever had any outside party review our iSeries security! Ignoring that glaring security exposure and getting right to the point, we were cited by the auditors for not having the security audit journaling function activated on our production iSeries system. (I know: an even worse security exposure!) We have been hesitant to activate the audit journal due to things we have heard from other installations, particularly about the impact security auditing has had on their disk utilization. Can you share some of the basics on security journal management according to your experiences and possibly alleviate our concerns about the receivers?

    Thanks!

    –Saleem

    First of all, don’t feel bad about the ding on your audit for not having auditing turned on. Even in this age of über-logging where everything you can think of is being tracked, there are some iSeries shops that simply haven’t addressed this issue yet. Usually this is because the company is in an area of business that has not been subjected to any widespread IT security/auditing regulations like those in the financial or healthcare industries have. Additionally, I can’t tell you how many times I’ve heard the line, “We need to get rid of some of the security journals because we’re running out of disk space!” As it is with programmers thinking they need *ALLOBJ special authority, so it is with blaming disk space problems on security auditing. However, like it or not, as you just found out, the government’s desire to enforce the provisions of SOX is a real one. So, since you must comply with the requirement to implement controls for any data that may impact the company financials, as step one, you had better turn on iSeries security journaling and put together a plan for managing the resulting output!

    Let’s start with some basics. When iSeries security monitoring is activated, the operating system logs security events that occur on your system. These events are recorded in special system objects called journal receivers, which are “attached to” or exclusively associated with the QAUDJRN journal in library QSYS. You can set up the audit journal receivers to record different types of security events, such as a change to a system value or user profile, or an unsuccessful attempt to access an object. The following values control which events are logged:

    • The audit control (QAUDCTL) system value
    • The audit level (QAUDLVL and QAUDLVL2) system values
    • The audit level (AUDLVL) value specified in the user profiles
    • The object auditing (OBJAUD) value of the user profile objects (and all other system objects as well)

    As I’m sure you’ve read somewhere before, the information that is recorded in the audit journals can be used:

    • To detect security errors and violations
    • To plan migration to a higher security level, say from level 30 to level 40
    • To monitor the use of sensitive objects, such as powerful commands and confidential files

    Managing the Audit Journal and Journal Receivers

    IBM clearly states that “the auditing journal, QSYS/QAUDJRN, is intended solely for security auditing. Objects should not be journaled to the audit journal. Commitment control should not use the audit journal. User entries should not be sent to this journal using the Send Journal Entry (SNDJRNE) command or the Send Journal Entry (QJOSJRNE) API.”

    What this means is that the security audit journal should not be shared among other applications and processes looking for a place to journal their transaction data. Security journal information is very important and sensitive in its own right, so it must be treated accordingly. Just remember that if something happens to the journal or to the currently attached receiver such that the system cannot write auditing entries to the journal, the system value QAUDENDACN determines what the system will do about it–either turn off auditing and send a notification to the QSYSOPR and QSYSMSG message queues (*NOTIFY) OR turn off auditing and issue the power down system command (*PWRDWNSYS). Most sites use the former setting and, honestly, I have yet to see an installation that used the latter.

    I always recommend that you have the system manage the changing of journal receivers. If it is set to user-managed, then it will require manual intervention to stay on top of the receivers. Specify MNGRCV(*SYSTEM) when you create the QAUDJRN journal or, if it’s already created, change the journal to that value so that the system automatically detaches the receiver when it reaches its threshold size and creates and attaches a new journal receiver. This is called system change-journal management.

    Here is how to change a user-managed journal to be system-managed:

    1.  On a command line, type WRKJRNA, press F4. Enter QAUDJRN for the Journal and leave *LIBL for the library. Your screen should look like the screen shown below:


    Press Enter

    After you press Enter you should see a screen similar to the one shown below. Please make note of the information on your screen that corresponds with the information in bold type in the screen shown below.

    1 = Journal Name
    2 = Library that journal resides in
    3 = Name of the currently attached journal receiver
    4 = Library that currently attached journal receiver resides in

    After you have made note of all of the necessary information press F3 to exit the Work with Journal Attributes screen.

    2.  On a command line, type CRTJRNRCV press F4. The journal receiver needs to be at least one number larger than the one noted above in Step 1. For example, if ZAUDJR0011 is attached, use ZAUDJR0012 here. The library needs to match the library for the journal receiver shown above (QGPL for example), Auxiliary storage pool ID is *LIBASP, Journal receiver threshold is variable (I suggest using the default of 1500000, which is 1.5GB per receiver). Text should be ‘Audit Journal Receiver’. Below is an example of what the screen should look like before you press Enter.


    After you have verified the information is correct. Press Enter. This will create a new journal receiver on your system.

    3.  On a command line, type CHGJRN, press F4. The journal to be changed is QAUDJRN and library is QSYS (unless otherwise displayed in Step 1). Press Enter.


    The returned screen should be filled in as noted below. The Journal receiver number used is the one you created in Step 2 above. Also, make sure that the Manage receivers option is specified as *SYSTEM:


    After you have made all of the changes shown above, press Enter. This will attach your newly created receiver, and tell the operating system to start managing the journal receivers.

    Use the WRKJRNA command as in step 1 and press F15 from the screen where the attached journal number is displayed. This will show all associated receivers. Part II of this tip will discuss a strategy for on-line retention and management of the security audit journal receivers themselves.

    Steve Martinson is a senior consultant and manager of the iSeries Security Practice for Servique, LLC. Martinson’s primary focus is on enterprise implementations of NetIQ Security Solutions for iSeries (NSSi) for key NetIQ accounts, starting at the planning stage and helping customers move through assessment, design and implementation.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Advanced Systems Concepts:  iSeries data access like nothing else with SEQUEL
    COMMON:  Join us at the Spring 2006 conference, March 26-30, in Minneapolis, Minnesota
    Vision Solutions:  The Industry Standard in eServer High Availability

    iSeries Software Helps NetManage’s Recovery Power6 Gets Second Silicon, IBM to Crank the Clock

    Leave a Reply Cancel reply

Volume 6, Number 6 -- February 8, 2006
THIS ISSUE SPONSORED BY:

T.L. Ashford
WorksRight Software
COMMON

Table of Contents

  • V5R4 CL Enhancements, Revealed and Detailed
  • iSeries Security Journal Receiver Management, Part 1
  • Admin Alert: Creating an i5/OS User Profile Architecture

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle