• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Popping The IBM i Security Bubble

    May 27, 2014 Alex Woodie

    As an IBM i professional, you feel safe knowing that your organization has entrusted its data to the most secure business server on the planet. You watch as other companies–Target, eBay, victims of Chinese hackers–scramble into spin-control mode following a breach, confident that will never happen at your shop. If this sounds familiar, you’ve succumbed to a dangerous condition known as “IBM i security bubble-itis.” Let us help you pop it.

    The first step in overcoming this debilitating condition is admitting you have a problem. Like the security blanket your kid won’t give up, your mistaken faith in the inherent superior security of the IBM i platform affords only imaginary protection against evil forces. What you don’t know about IBM i security can very definitely hurt you. You eventually got rid of your kid’s tattered wubbie, and likewise, you eventually must get rid of your misplaced assumptions about IBM i security.

    If your IBM i shop is like most we’ve seen over the years, the inadequacies of your security controls run deep and wide. Some of the most common IBM i security problems include:

    • Too many users are granted too much authority to potentially do bad things on the box
    • Passwords that guard these powerful user profiles are weak and rarely reset
    • Network connection points for FTP, ODBC, and the like are too often left totally open
    • Object-level security–which offers another valuable layer of protection in IBM i and can mask other security deficiencies–is rarely used
    • IBM i security level is frequently set too low

    Nearly all of these problems can be traced to an initial failure to properly configure the IBM i security settings and system values, and an ongoing failure to keep the box secure. Security experts will tell you that the keys to achieving good security are the three Ps of policy, process, and procedure. Give or take, 90 percent of the security battle is establishing a good policy up front and then following the processes and procedures necessary to maintain the requisite level of control.

    The three Ps are all well and good. But perhaps the biggest security hurdle that IBM i shops face is the Big A, as in Awareness.

    IBM i professionals have grown accustomed to thinking of the server as secure, but that kind of thinking is misplaced and dangerous. The yawning lack of awareness of the basics of IBM i security (You never changed your default user passwords? Really? You never thought to guard the FTP exit point? Really?? You don’t even know what an FTP exit point is? Really???) would be slightly amusing if it weren’t so downright scary.

    The consequences of a data breach are high, and getting higher every year. According to a Ponemon Institute study of 315 breaches released by IBM this month, the average cost of a data breach has increased by 15 percent this year to $3.5 million per breach. The average cost per lost or stolen record increased by 9 percent to $145 per record. The costs are even higher in the U.S. (this was a global study).

    The size and number of data breaches appears to be growing, driven by the increasing sophistication of cybercriminals who launch targeted attacks, or “advanced persistent threats,” that use multiple attack vectors and are designed to evade traditional defenses.

    Your IBM i security bubble is false and needs popping.

    Just last week, eBay reported that hackers stole information on 145 million people, including email addresses, passwords, birth dates, and mailing addresses, but no credit card or PayPal information, according to Privacy Rights Clearinghouse. If true, that would be the largest data breach in history–bigger than the 2009 breach of Heartland Payment Systems, which compromised records on 130 million people.

    But it’s the Target breach of 110 million people’s data in December 2013 that has security experts jumpy. There were red flags in that data breach, which was conducted by somebody (allegedly a Russian hacker) who stole the sign-on credentials of a third-party vendor who worked on Target’s systems and then compromised the point of sale system. But nobody was paying attention to the flags.

    The key failure in Target’s case appears to be a breakdown of process. According to a March story in BusinessWeek, Target’s security officers assumed that the flurry of activity generated by a new FireEye intrusion detection systems were false positives. In fact they were true positives.

    “It’s unfortunate for Target. They had the controls in place. I talked to those guys and their security is phenomenal,” says Robin Tatam, director of security technologies at PowerTech, which recently released its 11th annual State of IBM i Security Report. (Spoiler alert: it still sucks).

    “Target had a significant impact in business awareness because it was the first big box retailer to be hit by something so dramatic,” Tatam continues. “It’s giving people the idea that if it can happen to Target, it can happen to us.”

    Don’t be surprised if there are more breaches like Target’s in the near future. Not only do companies and other organizations have to worry about rouge cybercriminal elements, but well-funded attacks from government-backed cyberwarriors as well. The Chinese military, in particular, is seen as the perpetrator behind many attacks against the commercial interests of American corporations, the United States Department of Justice alleged in a lawsuit last week.

    If the specter of Russian hackers and Chinese cyberspies getting access to your servers and data isn’t enough to scare you, then you’re not paying attention. Yorgen Edholm, the CEO of secure file sharing software firm Accellion, wonders what’s next. “Cyber warfare is giving the enterprise community a rude awakening, and organizations are just now starting to learn the lessons from attacks on Target, eBay, and others,” he tells IT Jungle. “There is now an industry built solely for the purpose of targeting vulnerable organizations, so IT needs to boost its efforts with the proper security investments and tools.”

    For you IBM i pros, the key message is that the magical cloak of invisibility (i.e. security through obscurity) that you intentionally or unintentionally relied on is getting thinner every year. It’s true that you wear a lot of different hats–programmer, administrator, operator, analyst, chief bottle washer, security officer–and that IT budgets don’t allow you to hire the expertise you need. But just becoming aware of the potential problems that stem from having extremely poor security is a good first step to eventually fixing it.

    “The IBM i organizations have not traditionally taken it seriously because the reputation of the box is that it’s secure, as opposed to securable. And there’s a big different between the definitions of those two words,” Tatam says. “We’re still not doing what we need to do. [The results of the study] still tells me there’s a general lack of awareness in the i space.”

    RELATED STORIES

    State Of IBM i Security? Dismal As Usual, PowerTech Says

    It’s Time For Security Administrator Roles At IBM i Shops, Skyview Says



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    DRV Tech

    Get More Out of Your IBM i

    With soaring costs, operational data is more critical than ever. IBM shops need faster, easier ways to distribute IBM applications-based data to users more efficiently, no matter where they are.

    The Problem:

    For Users, IBM Data Can Be Difficult to Get To

    IBM Applications generate reports as spooled files, originally designed to be printed. Often those reports are packed together with so much data it makes them difficult to read. Add to that hardcopy is a pain to distribute. User-friendly formats like Excel and PDF are better, offering sorting, searching, and easy portability but getting IBM reports into these formats can be tricky without the right tools.

    The Solution:

    IBM i Reports can easily be converted to easy to read and share formats like Excel and PDF and Delivered by Email

    Converting IBM i, iSeries, and AS400 reports into Excel and PDF is now a lot easier with SpoolFlex software by DRV Tech.  If you or your users are still doing this manually, think how much time is wasted dragging and reformatting to make a report readable. How much time would be saved if they were automatically formatted correctly and delivered to one or multiple recipients.

    SpoolFlex converts spooled files to Excel and PDF, automatically emailing them, and saving copies to network shared folders. SpoolFlex converts complex reports to Excel, removing unwanted headers, splitting large reports out for individual recipients, and delivering to users whether they are at the office or working from home.

    Watch our 2-minute video and see DRV’s powerful SpoolFlex software can solve your file conversion challenges.

    Watch Video

    DRV Tech

    www.drvtech.com

    866.378.3366

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Robot Simplifies Setup of IBM i Message Monitor The Geezer’s Guide to Free-Form RPG, Part 3: Data Structures and More Data Definitions

    Leave a Reply Cancel reply

Volume 24, Number 19 -- May 27, 2014
THIS ISSUE SPONSORED BY:

Infinite Corporation
Maxava
Manta Technologies
CloudFax400
Shield Advanced Solutions

Table of Contents

  • Lining Up Power7+ Versus Power8 Machines With IBM i
  • Skills, IBM i, Power8, And The Gathering Of Clouds
  • Popping The IBM i Security Bubble
  • Mad Dog 21/21: Zigbee And The Waggle Dance
  • IBM i Finds A Place In The Cloud
  • Reader Feedback On We’re Integrated, We’re A Platform
  • IDC Revises 2014 Global IT Spending Projections Downward
  • IBM Has No Retirement Party Planned For Tape
  • Are You A Tactician Or A Visionary?
  • Big Data Accelerates 2013 Software Market; IBM Absent From Top Spots

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle