• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Security Policies Vs. Security Procedures

    June 16, 2015 Patrick Botz

    It seems that many people don’t understand the difference between security policies and procedures. When I ask to see a customer’s security policy, if I get anything, it is usually documentation about how system security values should be set. Once in a while it contains a description about how certain tasks will be accomplished. For example, updating applications on the production system. While this kind of documentation is useful, it is not a security policy.

    In short, security policy identifies acceptable and/or unacceptable uses of various business assets. Importantly, security policy shouldn’t include descriptions of how to enforce, prevent, or identify wanted and unwanted behavior.

    Security procedures, on the other hand, do describe various processes and techniques that will be used to enforce, prevent, or identify wanted and unwanted behavior. The documents I usually get are examples of security procedures.

    Consider an organization that requires management approval before developers are given *ALLOBJ special authority on the production system. This is an example of a security policy statement. In order to enforce this policy, the company uses the help desk ticketing system along with a homegrown application to accomplish this. The program requires the programmer to enter a help desk ticket number. The program checks this against the help desk ticketing system and ensures that the management-approved box was checked. It then writes a log file entry with the date, time, ticket number, and the programmer user profile name to record the event. The program then calls another program that adopts a user profile that has *ALLOBJ and then calls QCMD. The programmer has *ALLOBJ authority until the program is ended.

    For the example discussed above, a security procedures document will contain a description that includes statements about the following elements:

    • Developer user profiles on the production system will have no special authorities assigned to them.
    • To obtain the special authority required for debugging, developers will use the “ELVPRV” (elevate privilege) program.
    • A reference to the security policy statement this procedure is intended to enforce is also very useful.

    Descriptions of the security related system value settings should be included along with the process to be followed when/if they need to be changed temporarily. Basically, any actual security related settings (e.g., special authorities required by various groups of employees, which TCP/IP servers should not be started automatically, etc.) are all topics that should be included in a security procedures document.

    Also important to include in a security procedures document is a description of the process to be followed in order to gain approval for an exception to a specific security policy or to use an undocumented process or procedure. In these cases, the security policy states that: Policies may only be bypassed by executing the security policy exception approval process. The security policy would then describe the procedure. If homegrown applications are used to implement some or all of the procedure, the program documentation describes the mechanisms and tools used to accomplish the objectives of the program.

    Essentially, security policy defines behavior and security procedures define how those behaviors are enforced, prevent, and/or identified.

    Patrick Botz is President and CTO of Botz & Associates. His expertise includes security strategy, security policy enforcement, password management, single sign-on (SSO), industry and government compliance, and biometrics. He is the architect of the SSO stat! service. Previously he worked as Lead Security Architect at IBM, and he founded the IBM Lab Services security consulting team. You can connect with Pat here.

    RELATED STORIES

    EIM Identifier Naming

    Job User Name And Current Job User

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    DRV Tech

    Get More Out of Your IBM i

    With soaring costs, operational data is more critical than ever. IBM shops need faster, easier ways to distribute IBM applications-based data to users more efficiently, no matter where they are.

    The Problem:

    For Users, IBM Data Can Be Difficult to Get To

    IBM Applications generate reports as spooled files, originally designed to be printed. Often those reports are packed together with so much data it makes them difficult to read. Add to that hardcopy is a pain to distribute. User-friendly formats like Excel and PDF are better, offering sorting, searching, and easy portability but getting IBM reports into these formats can be tricky without the right tools.

    The Solution:

    IBM i Reports can easily be converted to easy to read and share formats like Excel and PDF and Delivered by Email

    Converting IBM i, iSeries, and AS400 reports into Excel and PDF is now a lot easier with SpoolFlex software by DRV Tech.  If you or your users are still doing this manually, think how much time is wasted dragging and reformatting to make a report readable. How much time would be saved if they were automatically formatted correctly and delivered to one or multiple recipients.

    SpoolFlex converts spooled files to Excel and PDF, automatically emailing them, and saving copies to network shared folders. SpoolFlex converts complex reports to Excel, removing unwanted headers, splitting large reports out for individual recipients, and delivering to users whether they are at the office or working from home.

    Watch our 2-minute video and see DRV’s powerful SpoolFlex software can solve your file conversion challenges.

    Watch Video

    DRV Tech

    www.drvtech.com

    866.378.3366

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    HiT Software:  Make your data pay off quickly and easily, regardless of location with DBMoto.
    SystemObjects:  Send SMS, email & push messages from your IBM i applications!
    LaserVault:  FREE ON-DEMAND WEBINAR: Understanding Tapeless Backups. Watch it now >

    OpenPower Partners Open SuperVessel Dev Cloud dbFunnel Provides Native ETL For IBM i

    Leave a Reply Cancel reply

Volume 15, Number 12 -- June 16, 2015
THIS ISSUE SPONSORED BY:

ProData Computer Services
CCSS
WorksRight Software

Table of Contents

  • iSphere Plug-in Expands RSE/RDi Toolset
  • Two Ways To Rollup
  • Security Policies Vs. Security Procedures

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • The Power11 Transistor Count Discrepancies Explained – Sort Of
  • Is Your IBM i HA/DR Actually Tested – Or Just Installed?
  • Big Blue Delivers IBM i Customer Requests In ACS Update
  • New DbToo SDK Hooks RPG And Db2 For i To External Services
  • IBM i PTF Guide, Volume 27, Number 33
  • Tool Aims To Streamline Git Integration For Old School IBM i Devs
  • IBM To Add Full System Replication And FlashCopy To PowerHA
  • Guru: Decoding Base64 ASCII
  • The Price Tweaking Continues For Power Systems
  • IBM i PTF Guide, Volume 27, Numbers 31 And 32

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle