• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Time To Get Your 2FA On, IBM i Admins

    April 3, 2017 Alex Woodie

    System administrators working in regulated industries will soon be required to sign-in to servers using two-factor authentication (2FA), according to the latest PCI requirement. The industry regulation will impact administrators working with all types of computer systems, and will likely be enforced in late 2017 or early 2018, security experts say.

    In prior versions of the Payment Cardholder Industry Data Security Standard (PCI DSS), only remote administrators were required to use 2FA, which bolsters the security of the sign-on process by requiring users to show “something you know,” like a password, as well as “something you have,” like a hardware key fob or an automatically generated code.

    But when PCI DSS version 3.2 was released late last year, the standards body changed that rule, and now requires all administrators – even those signing on locally – to use 2FA, or multi-factor authentication, as the group prefers to call it.

    This change was made in response to the evolving cybersecurity threat in the corporate landscape, says Patrick Townsend, CEO and founder of Townsend Security.

    “The thinking is that anyone with administrative privileges, whether they are local or not, represents a risk in that environment,” Townsend tells IT Jungle. “So many attacks now involve comprising a user’s PC. I’m sitting here right now and I’ve got access to IBM i servers. If I have administrative capability and my PC gets infected, in essence I’ve given the attackers a way to get to that environment.”

    By requiring all admins to take the extra authentication steps that 2FA entails, the PCI standards body hopes to add one more layer of protection around sensitive data stores. “What the guidance is reflecting is just an understanding that the attacks are distributed,” Townsend says. “Every PC, every server inside your organization, is an attack point against credit card data. And so everybody who can log in – no matter from where – should use 2FA.”

    For now, the PCI group is not requiring end users who are involved with credit card data – such as a customer service agent who places orders into a system – to use 2FA. There are other elements of the PCI DSS that cover the use of powerful authorities, and if a company is adhering to them properly, then regular users will not be given user profiles that give them super-user capabilities.

    Because administrators do have that kind of access, it’s important to lock down use of those user profiles, Townsend says. “The assumption is that that CSR doesn’t natively have administrative authority on the IBM i server,” he says. “But if I’m an IBM i QSECOFR or if I have ALLOBJ authority, if I’m highly privileged and there’s credit card processing going on there, then yes, those people have to implement 2FA with the system.”

    PCI DSS version 3.2 was issued last fall. The PCI typically gives the industry a cushion of six to 12 months to implement its guidance before it starts requiring adherence to the new regulations, so the clock is ticking. “We’re in the transition period now but it will become a hard requirement probably early next year,” Townsend says.

    While security firms like RSA have been building 2FA systems that use random number generators for decades, it’s still a relatively new phenomenon in the wider corporate culture. American consumers have only recently started using a version of 2FA with the “chip plus PIN” authentication method, where the PIN represents “something you know” and the chip on the card represents “something you have.”

    Three years ago Townsend Security launched a 2FA solution for IBM i called Alliance Two Factor Authentication that uses auto-generated PIN sent to the user via SMS as the second piece of the 2FA puzzle. Sales of the product have been modest but Townsend expects business to pick up once the PCI puts some teeth behind its guidance.

    “Nobody wakes up saying ‘Gee I really want to do a security project today.’ People tend to be quite reactive,” Townsend says. “I think your average customer, whether they’re IBM i or not, tend to put these projects off until they absolutely have to do them. That’s just the world we live in.”

    Other IBM i software vendors offering 2FA solutions that work with the platform include Kisco Information Systems, mrc, Arpeggio Software, and Linoma Software.

    RELATED STORIES

    Kisco Rolls with 2FA, Revs Network Security Tool

    Townsend Looks to Spread 2FA Far and Wide

    Townsend Launches 2FA To Thwart Cyber Attacks On IBM i

    m-Power Brings 2FA to Web Apps

    Arpeggio Goes for the ‘Hacker Shutdown’ with 2FA Offering for IBM 

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: 2FA, IBM i, Payment Card Industry's Data Security Standard, PCI, PCI DSS, Two-Factor Authentication

    Sponsored by
    Raz-Lee Security

    Protect Your IBM i and/or AIX Servers with a Free Virus Scan

    Cyber threats are a reality for every platform, including IBM i and AIX servers. No system is immune, and the best defense is prompt detection and removal of viruses to prevent costly damage. Regulatory standards across industries mandate antivirus protection – ensure your systems are compliant and secure.

    Get My Free Virus Scan

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Guru: The XML Composition Conundrum of XMLNAMESPACES or XMLATTRIBUTES MSPs Get Monthly IBM i Pricing; Why Not Everyone?

    Leave a Reply Cancel reply

TFH Volume: 27 Issue: 22

This Issue Sponsored By

  • ProData Computer Services
  • Quadrant Software
  • COMMON
  • WorksRight Software
  • Northeast User Groups Conference

Table of Contents

  • MSPs Get Monthly IBM i Pricing; Why Not Everyone?
  • Time To Get Your 2FA On, IBM i Admins
  • Guru: The XML Composition Conundrum of XMLNAMESPACES or XMLATTRIBUTES
  • Mad Dog 21/21: iBird In The Hand Or iToo In The Bush
  • SystemObjects SmartPad4i Mobilizes RDi

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • POWERUp 2025 –Your Source For IBM i 7.6 Information
  • Maxava Consulting Services Does More Than HA/DR Project Management – A Lot More
  • Guru: Creating An SQL Stored Procedure That Returns A Result Set
  • As I See It: At Any Cost
  • IBM i PTF Guide, Volume 27, Number 19
  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle