• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • PowerTech: IBM i Security Still Needs Work

    April 19, 2011 Alex Woodie

    The results from PowerTech‘s latest State of IBM i Security report are in, and the results are mixed. While the software company’s survey shows signs of improvement in some areas, such as the average number of users with unfettered system access, there are still areas of grave concern to security professionals, who have almost come to expect a lackadaisical approach to security from IBM i customers.

    Each year, PowerTech publishes a State of IBM i Security report that summarizes the results of hundreds of system audits the company performs on the IBM i servers of customers and prospects. For the State of IBM i Security 2011 report, PowerTech did things a little differently; it included security audit data from an independent source. Of the 243 IBM i security audits that make up the data base for the report, PowerTech performed 182 of them.

    The 2011 report tracks very well with the 2010 report, and allows for a year-to-year comparison of the most important components of security for the IBM i server. There was some good news in the area of powerful user profiles, which is always a big concern to security professionals.

    According to PowerTech’s report, the average IBM i shop had 52 user profiles with complete access to everything on the system, which is designated as ALLOBJ authority. That was down from 67 user profiles with ALLOBJ authority in PowerTech’s 2010 report, and a sign that maybe, perhaps, IBM i professionals are starting to take security seriously.

    Then again, 52 user profiles are still way too many. “Why would you want 52 security officers on your system?” PowerTech support manager Jill Martin said in a recent webinar on the 2011 report findings. “You could set everything up exactly the way you would want it, and there would be 51 other people who could reverse that decision. It’s really important to limit that number.”

    There was good news on the network access front. In the 2011 report, PowerTech finds that 54 percent of IBM i shops audited have exit programs in place to protect against unwanted access via FTP, ODBC, and other network access points that IBMers didn’t envision when building the S/3X menu-based security system, which the IBM i platform has inherited. That number is up from 43 a year ago.

    Similarly, 87 percent of IBM i shops have the system auditing journal turned on today, compared to 82 percent in PowerTech’s 2010 report. Auditing gives IBM i shops the capability to review what happened on the system, such as a large number of invalid sign-on attempts. This is an absolutely critical capability when trying to figure out, for example, how a hacker got onto the system. “If you’re not auditing, crazy things can happen,” Martin said.

    There was also some good news on the password front. The 2011 report found that the vast majority of shops are now using a minimum password length of six digits and that 30 percent are using passwords with seven or more digits, compared to about 20 percent a year ago. However, this isn’t quite up to snuff with the PCI data security standard, which requires passwords be at least seven digits. Most IBM i shops would fail that portion of the audit.

    Another important element tracked by PowerTech year to year is the security level system settings. IBM recommends that IBM i shops run at level 40 or higher, as there are some well-known vulnerabilities in level 30, such as the capability to run a job as another user.

    Out of 182 systems audited for security level in the 2011 report, 121 IBM i shops, or 66 percent, were running at level 40. That was up slightly from the 2010 report, when about 61 percent of shops were at level 40.

    However, there was a big drop off in the number of shops at level 50, the highest security level. More than 15 percent of shops in the 2010 report were running at level 50, whereas just 1 percent of shops were at level 50 in the 2011 report.

    While PowerTech’s report shows some improvement in certain areas of security, there is still a long way to go before IBM i shops demonstrate the same level of concern about security as their Windows, Linux, and network brethren do.

    “Unfortunately, security awareness amongst IBM i professionals is generally pretty low,” PowerTech’s director of security technologies Robin Tatam said during the recent webinar. “I think this is partly because a lot of us heard from IBM over the years that the i platform is incredibly secure, and just assumed that IBM had done all the work for us. All we have to do is show up and use the applications. Unfortunately, this is far from the reality. While the server is extremely securable, it does take work to make it that way.”

    To download a copy of the State of IBM i Security 2011 or to view the recent webinar on the study’s findings, see the company’s website at www.powertech.com.

    RELATED STORIES

    i/OS Security Warnings: Like Talking to a Brick Wall

    PowerTech Says AS/400 Shops Still Flying in Security Danger Zone

    System i Security: Lots of Room for Improvement

    Security Still an Issue in 2007 for System i5 Shops

    PowerTech Issues Third Annual State of i5/OS Security Report



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    New Generation Software

    FREE Webinar:

    Creating Great Data for Enterprise AI

    Enterprise AI relies on many data sources and types, but every AI project needs a data quality, governance, and security plan.

    Wherever and however you want to analyze your data, adopting modern ETL and BI software like NGS-IQ is a great way to support your effort.

    Webinar: June 26, 2025

    RSVP today.

    www.ngsi.com – 800-824-1220

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    SEQUEL Software:  FREE Webinar: Track Key Business Metrics at a Glance. April 27
    JAMS Job Scheduler:  Enterprise job scheduling for System i, Windows, Linux, and UNIX
    COMMON:  Join us at the 2011 Conference & Expo, May 1 - 4 in Minneapolis, MN

    IT Jungle Store Top Book Picks

    BACK IN STOCK: Easy Steps to Internet Programming for System i: List Price, $49.95

    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The iSeries Pocket Database Guide: List Price, $59
    The iSeries Pocket SQL Guide: List Price, $59
    The iSeries Pocket WebFacing Primer: List Price, $39
    Migrating to WebSphere Express for iSeries: List Price, $49
    Getting Started with WebSphere Express for iSeries: List Price, $49
    The All-Everything Operating System: List Price, $35
    The Best Joomla! Tutorial Ever!: List Price, $19.95

    IBM Offers Freebie Slices on Shiny New SmartCloud Installing a PHP/MySQL Open Source Application on i

    Leave a Reply Cancel reply

Volume 11, Number 14 -- April 19, 2011
THIS ISSUE SPONSORED BY:

Help/Systems
BlueFountain Technologies
ASNA
ManageEngine
Shield Advanced Solutions

Table of Contents

  • AURA Keeps Classic IBM i PHP Toolkit Alive
  • PowerTech: IBM i Security Still Needs Work
  • New Conference Specializes in DB2 for i and SQL
  • WebSphere Application Server 8 Brings Easier Install
  • SEQUEL Updates Web Interface of BI Product
  • ARCAD Reorganizes Product Suite, Hooks Into Rational Team Concert
  • Connectria Unveils IBM i Remote Monitoring Service
  • Oracle to Support Current JDE Releases Through 2015
  • DSC Announces Data Center Upgrade for SafeData
  • Customer Service Initiative Launched by Quadrant

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle