• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • It’s Time For Security Administrator Roles At IBM i Shops, Skyview Says

    September 16, 2013 Alex Woodie

    It’s time for system administrators to give up security-related tasks and hand them over to a dedicated security administrators in IBM i shops, says Skyview Partners. While the jack-of-all trades approach has succeeded in keeping costs down, the risks of losing data are becoming too great to rely on the skills of a generalist, says the company, which just published a new guide describing the role of an IBM i security administrator.

    “Security administration can no longer be lost in the list of things that a system administrator is supposed to do on a regular basis,” says Skyview president Carol Woodbury, a renown IT security expert and former security architect at IBM for the AS/400 (now IBM i) server.

    “IBM i administrators do a bit of this and a bit of that,” she continues. “Unfortunately, for whatever reason, security administration is one of those tasks that quite often falls off the list. The effect is that the risk to the system and data is increasing because security administration–from our experience–is not being performed.”

    Woodbury’s colleague, Skyview CEO John Vanderwall, agrees. “While systems administration is a well-founded discipline and it’s easy to define what a systems administrator is supposed to do, that is not the case for a ‘security administrator,'” he says. “Often times security administration is a just another task on the ‘to do’ list of the systems administrator. What we’ve discovered is the security administration is pretty far down on the list, mostly because system admins aren’t quite sure of what they should be paying attention to. Sure they know some basics, but in reality it’s the details that count. The old adage that the ‘devil is in the details’ seems to apply here.”

    Woodbury’s and Vanderwall’s observations are backed up by years of security studies performed by PowerTech, where Woodbury also used to work. Year after year, PowerTech publishes annual State of Security reports that demonstrate the dismal state of security on the IBM i platform. In most cases, the problems come down to using incorrect configurations. In many cases, IBM i shops never change the default settings, opening up rather large gaps in security on production systems.

    SkyView hopes to address that problem with its new e-book, called the IBM i Security Administrators Guide. “Some people administering the system have been trained to run the system but not attend to security,” Woodbury continues. “So we’re trying to raise the awareness that security administration needs to occur. In light of the fact that not everyone is trained, or it’s not something they do every day… we’ve provided this e-book to explain what should be accomplished by the person whose job it is to perform security administration.”

    Skyview took it upon itself to describe the security administrator’s role and the specific tasks that need to be performed on the IBM i server. “This book is a quick read intended to get to the heart of the matter, giving very specific guidance and help to companies so that security is properly addressed on the platform,” Woodbury says.

    Introducing the security administrator role to an organization doesn’t necessarily mean it needs to hire a new employee to take that role. It can be performed by an existing member of the IT staff, or even by an outside consultant. (SkyView provides such services, by the way.) The important thing is that more emphasis needs to be placed on the job of the security administrator. That means more time is allotted to it and (yes) more money is spent ensuring that the job is getting done.

    It will be a tough sell. IBM i organizations are notoriously tight with the purse strings, and the Great Recession has only solidified their approach to getting much more out of their IT staffs than with Windows and Unix servers. However, the writing is on the wall. Just as it’s becoming clear that IBM i shops may be best served by hiring dedicated database administrators (DBAs) to oversee the handling of data, it’s also become clear that security isn’t something to mess around with.

    SkyView has seen its share of security horrors at its customer shops, which it will never discuss publicly (despite the best efforts of nosey reporters). However, the company will share general observations about what it’s seen through its Security Check-up security assessment services.

    “In some cases, we have discussed vulnerabilities that we discovered and then the next year, we discuss the same vulnerabilities,” Woodbury says. “Things like profiles with never-changing passwords, inactive profiles that remain available for use, IFS directories that need to be secured, etc. They know they need to address the issues–they have intentions to do it each year–but it never gets done.”

    It’s time to get them done.

    To download the IBM i Security Administrators Guide, go to Skyview’s website at www.skyviewpartners.com.

    RELATED STORIES

    The 10-Year Security Itch Needs Scratching

    SkyView Launches Security Compliance Reporting Service

    SkyView Launches New Auditing Tool

    SkyView Gets Tough on User Profiles

    SkyView Taps New CEO to Ride the Compliance Wave

    SkyView Adds PCI Checks to Risk Assessment Tool

    SkyView Goes GUI with i OS Security Tool



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Raz-Lee Security

    Protect Your IBM i and/or AIX Servers with a Free Virus Scan

    Cyber threats are a reality for every platform, including IBM i and AIX servers. No system is immune, and the best defense is prompt detection and removal of viruses to prevent costly damage. Regulatory standards across industries mandate antivirus protection – ensure your systems are compliant and secure.

    Get My Free Virus Scan

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Six Tips For Managing IBM i Spooled File Storage PSGi Offers Help for Neglected IBM i Servers

    Leave a Reply Cancel reply

Volume 23, Number 31 -- September 16, 2013
THIS ISSUE SPONSORED BY:

BCD
Infinite Corporation
Abacus Solutions
Computer Keyes
WorksRight Software

Table of Contents

  • Slices Of i For The Little Guys
  • It’s Time For Security Administrator Roles At IBM i Shops, Skyview Says
  • IBM Aims NextScale Hyperscale Boxes At Clouds–And Possibly Power8
  • Mad Dog 21/21: For Blue It’s Difficult, For Meme It’s Easy
  • Key CIO Confab Uncovers Concerns
  • Stalled Budgets Stand In The Way Of IT Hiring
  • Intel’s New Xeon E5s Push Back Against Power7+ Processors
  • Help/Systems Takes Power7 Trends And Tech Tour On The Road
  • Some Tweaks On Deals And Flex System Price Changes
  • IBM Sells Off BPO Services Biz To Synnex For $505 Million

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • POWERUp 2025 –Your Source For IBM i 7.6 Information
  • Maxava Consulting Services Does More Than HA/DR Project Management – A Lot More
  • Guru: Creating An SQL Stored Procedure That Returns A Result Set
  • As I See It: At Any Cost
  • IBM i PTF Guide, Volume 27, Number 19
  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle