• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Get Help To Batten Down The Hatches On Your IBM i

    November 28, 2022 John Fehr

    If you have a person on your IT staff that understands the complexities of aggressive malware, ransomware, viruses, and other kinds of hacking and is actually jazzed by this sort of thing – in a good way, a white hat kind of way – and who knows how to use security tools and a deep knowledge to defend your IBM i (and probably your Window Servers ) against such attacks, well bully for you. And if they work for next to nothing, you must be living in some sort of dream world.

    For the rest of the IBM i community, the safest assumption when it comes to securing against hostile attacks is that they do not have such skills, that their systems are not that secure, and they are not being hacked mainly because someone has not gotten around to it yet. This isn’t security by obscurity, for which the AS/400 and IBM i is famous (or infamous, depending on how you want to look at it) so much as it is a security lottery. Or Russian roulette.

    The first step in battening down the hatches on your IBM i platform is to admit that you have a problem, and the second step is to get help from experts who can do a security assessment. And while that assessment is important, it is the steps that you take after the results of that assessment – and brace yourself for all kinds of issues that you suspected you might have or that you didn’t even imagine you had – will make the difference between having a continually secure IBM i system and putting your head back into the sand.

    One of the primary direct attacks on the IBM i system is through the Integrated File System, or IFS, which is a POSIX-compliant, OS/2 parallel file system that IBM embedded into the OS/400 platform back in 1995 to give it the look and feel of a Windows Server file system so Windows clients could use it as a kind of network storage. The IFS also allows external Windows Server applications a native way to put information onto the IBM i machine. This is great. But those IFS shares could be subject to malware and ransomware because they are like any other Windows file system. And right now, IBM i customers who are suffering from ransomware attacks are having their IFS file systems locked down and access to them prevented by hackers until they get money. This is happening. It is not a theory.

    Rather than making root access to the IFS a public thing, organizations need to ask: Who needs to have access to the shares, and do they need read, write, or execute access to those shares? In a lot of cases, users and applications only need read access, or only need read access to certain directories underneath the IFS – they are only reading documents generated by other people or by applications. Most users do not need to execute access to the IFS. And more importantly, there are products, such as those from Precisely, that put two-factor authentication on the IBM i. This additional authentication places another layer between your IBM i and the threat actor. When IFS access is needed from a file share, adding the additional authentication layer allows you to control access as needed and to turn it off when it is not needed, locking it down.

    When Focal Point performs its Assure Security Risk Assessment, which we do for free, we have a set of native tools that look at everything. Many users have default passwords, or passwords with too few characters and no special characters. We find machines that have far too many system operator profiles, or far too many profiles that have *ALLOBJ and/or *SECADM authority. And equally dangerously, they have too many accounts that were set up for users who are no longer at the company, just sitting there waiting for a hacker to see and turn to their nefarious purposes and all looking normal. We just did a security assessment on a real IBM i system that had over 1,000 such latent profiles, all of which should be removed to lock the machine down better.

    After we run through our assessment, we present IBM i shops with a report of all of our findings, showing all of the system’s low, medium, and high-security risks. After that, if customers choose, we can generate a statement of work and create a build-to-suit contract, with estimated hours of work, to fix all of these issues. Simply put, it is much less costly to spend the time upfront to run an assessment and remediate any issues than it is to recover from being hacked.

    And for those who don’t ever want to deal with this again, Focal Point is very happy to put together a services engagement where we secure an IBM i system and then do the monitoring, patching, and training to keep your IBM i system secure on a continuous basis. And finally, for those of you who don’t want to mess with any of this anymore, customers can move their applications to our cloud and leave the system, system management, and system security entirely to us. We have the expertise that many of you quite frankly don’t, and sharing that expertise across hundreds and thousands of IBM i shops makes more economic and practical sense than trying to do it yourself. Deep security and system administration expertise is getting harder and harder to come by, and that means IBM i shops have to learn to share.

    John Fehr is the chief information security officer at Focal Point Solutions Group. Fehr has been on the IBM i platform for more than 20 years, and was the vice president of infrastructure and IS operations for Sandia Laboratory Federal Credit Union. Fehr got his masters in information protection, security, and national security from the University of New Haven back in 2017 and is currently pursuing his PhD in Cyber Defense at Dakota State University. Fehr is an active researcher and contributor at Madison Labs, PriLAB, addressing national and international data privacy knowledge gaps through research and solution building. Fehr holds certifications as a CISSP and GISP and in cloud security. Fehr is a former board member and current acting member of InfraGard, a program to enhance our nation’s collective ability to address and mitigate threats to United States’ critical infrastructure by fostering collaboration, education, and information-sharing through a robust private sector/government partnership.

    This content was sponsored by Focal Point.

    RELATED STORIES

    The Security Awareness Of People Is The Important Firewall In IT

    Managed Cloud Saves Money By Cutting System And People Overprovisioning

    With IBM i Security, You Don’t Know What You Don’t Know

    Focal Point Buys UCG Technologies, On The Hunt For More IBM i Deals

    Focal Point Emphasizes Security Assessments, Documents In The Cloud

    Managed Service Provider Picks Its Niche

    Focal Point Updates DR FlashCopy

    Startup Looks To Take the Pain Out Of HA Testing

    Hit A Fiduciary Home Run With A Backup, DR, Cybersecurity Triple Play

    Don’t Forget About The Co-Lo Alternative To Cloud

    Ransomware Epidemic Hits Epic Proportions, And IBM i Shops Take Notice

    Do The Math When Looking at IBM i Hosting For Cost Savings

    Disaster Recovery, At Your Service

    Taking The Pulse Of The IBM i Market

    If You Can’t Get To The Tape, It Doesn’t Matter If It Is Dead Or Not

    Industry Speaks: IBM i Predictions for 2020, Part 1

    UCG Becomes The Guardian Of Contract Management

    A Better Way To Skin The IBM i Cloud Cat

    UCG Technologies Takes Off To The Great White North

    UCG And HelpSystems Make Acquisitions

    Spreading A Wider IT Net At UCG Technologies

    Keeping Ransomware Out of the VAULT

    UCG And Expedient Partner For Expanded IBM i Hosted Services

    Vaulting Service Replaces Mirroring For IBM i Shop

    IBM i Shops Climb Into the VAULT

    IBM i Shops Turn to Vault400 for Protection

    UCG Grows BaaS Biz with VAULT400

    Mountains Of Data Bring Recovery Issues

    UCG Champions Technology Upgrade

    Two More Customer Wins for Vault400

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: Focal Point Solutions Group, IBM i, IFS, OS/400

    Sponsored by
    DRV Tech

    Get More Out of Your IBM i

    With soaring costs, operational data is more critical than ever. IBM shops need faster, easier ways to distribute IBM applications-based data to users more efficiently, no matter where they are.

    The Problem:

    For Users, IBM Data Can Be Difficult to Get To

    IBM Applications generate reports as spooled files, originally designed to be printed. Often those reports are packed together with so much data it makes them difficult to read. Add to that hardcopy is a pain to distribute. User-friendly formats like Excel and PDF are better, offering sorting, searching, and easy portability but getting IBM reports into these formats can be tricky without the right tools.

    The Solution:

    IBM i Reports can easily be converted to easy to read and share formats like Excel and PDF and Delivered by Email

    Converting IBM i, iSeries, and AS400 reports into Excel and PDF is now a lot easier with SpoolFlex software by DRV Tech.  If you or your users are still doing this manually, think how much time is wasted dragging and reformatting to make a report readable. How much time would be saved if they were automatically formatted correctly and delivered to one or multiple recipients.

    SpoolFlex converts spooled files to Excel and PDF, automatically emailing them, and saving copies to network shared folders. SpoolFlex converts complex reports to Excel, removing unwanted headers, splitting large reports out for individual recipients, and delivering to users whether they are at the office or working from home.

    Watch our 2-minute video and see DRV’s powerful SpoolFlex software can solve your file conversion challenges.

    Watch Video

    DRV Tech

    www.drvtech.com

    866.378.3366

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    IBM Alleges Micro Focus Stole CICS Code IBM “Harmonizes” Power Systems, Storage, And Software Prices Upward

    Leave a Reply Cancel reply

TFH Volume: 32 Issue: 79

This Issue Sponsored By

  • ProData
  • Focal Point Solutions Group
  • Eradani
  • DRV Technologies
  • WorksRight Software

Table of Contents

  • IBM “Harmonizes” Power Systems, Storage, And Software Prices Upward
  • Get Help To Batten Down The Hatches On Your IBM i
  • IBM Alleges Micro Focus Stole CICS Code
  • IBM To Stop Unencrypted Fix Downloads In February
  • IBM i PTF Guide, Volume 24, Number 47

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle