• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • PowerTech Says AS/400 Shops Still Flying in Security Danger Zone

    May 19, 2009 Dan Burger

    Security negligence is the great equalizer. It doesn’t matter if your IT projects are leading edge or whether IT has been in status quo mode since Frank Soltis was a pup. Security flaws can bring you to your knees quicker than plugging in an electric fan while standing a bucket of water. And the difference between being security smart and security stupid is just about as obvious. It’s not the IBM AS/400. It’s the way you use it.

    The way you don’t use it more accurately describes this appalling level of carelessness. Apparently there are no questions on the IT employee job evaluation forms that relate to security policies and whether they are being monitored or met. At least that’s the way it appears to be in far too many organizations.

    And, the funny thing is that it is not particularly expensive or time consuming to lock the doors to a great many potential security threats. You already have one of the most secure servers on the planet. It’s operator error that puts your business at risk.

    Yes, there’s a lot of finger-pointing going on in these first three paragraphs. After reading the recently released edition of “The State of the System i” report, you might be shocked to know what you didn’t know before, or maybe you’ll remember what you didn’t want to forget after reading the previous report.

    i OS security software developer PowerTech has made this annual report a wake-up call for quite a few years. It’s based on audits and security data–compiled during 2008 in this report–from companies that requested PowerTech’s assistance. That removes the randomness of these results and skews it toward a degree of security-risk awareness that probably makes this report sound more favorable than it would if it included companies that weren’t involved in security audits. It’s bad enough as it is with only companies that are somewhat security conscious participating.

    A quick comparison of the PowerTech survey shows a few areas where changes are occurring as security issues continue to plague organizations. At the top of the list is a redirection of focus from internal risks to external risks.

    “There’s a lot of conversations taking place about organized crime having entered the cyber crime area,” says John Earl, an independent security consultant who until recently worked for PowerTech. “There are big rewards and a lower chance of being caught and a lesser penalty in terms of prison time than other crime. It has tipped the balance to outside threats . Phishing programs can be purchased on the Internet for about $300. There are various hacker newsgroups. There are many people involved who are outside the grasp of law enforcement because of the international aspect of the Internet.”

    The latest PowerTech report is the first to include information on the size of the servers that the participants are using, which gives a pretty good balance across the sever lineup. For instance, 37 percent of the boxes were 520s, 19 percent were 570s, 17 percent were 550s, 9 percent were 525s, and 8 percent were 810s, leaving 10 percent to fill the “other” category.

    As a general rule, companies with 550 models or larger boxes are more likely to be dealing with regulatory compliance issues where security is emphasized. These are companies that can’t allow security-related issues to slide any longer.

    “I think compliance has had a great effect on bringing security issues to light,” Earl says.. “System administrators are in two broad camps when it comes to security. Those folks who know it’s the right thing to do and want to do it anyway. and those who consider security to be a hindrance. Where compliance fits in is that, if you think security is a hindrance, compliance will force you to do it whether you like it or not. What compliance has done is given some system administrators the lever to say, ‘Hey, we have to do this. Let’s get it done. Let’s do it right. Let’s do it now.'”

    There are six areas of concern identified in this security exposure report: powerful user profiles; user and password management; data access; network access control and auditing; system auditing; and system security values. This is the basic outline for company inspection and probably some type of remediation.

    User Profiles

    To begin with, companies are lax in controlling special authorities that not only allow unrestricted views to every file and program in the system, but that also leave the door open to far too many people to change and delete files and programs. If you want a great place to begin reducing risk, start by minimizing users with unrestricted access.

    Passwords

    An easy way into many unprotected systems is provided by the lazy use of default passwords. Using default passwords makes it less likely that users will forget them, but someone who wants into your system for nefarious purposes will try this way first. The most secure passwords include a mix of numbers and letters at least eight characters in length. Passwords should also be changed periodically. If you don’t have a password policy, particularly on sensitive files and programs, your risks are a lot higher than you think they are.

    Data Access

    Average users should not be able to log in to the system and get a catalog of all objects, access to any objects, or add, delete, or change objects. Far too many systems allow too many users access to too much information. It’s not difficult to control your data, unless you compare it to doing nothing at all. Nothing is easier than that, but the pain of being bitten in the butt isn’t so easy to take. When more than 50 percent of system users have the capability to change data, that’s not security–it’s insecurity.

    Network Access

    It’s highly likely that access to your AS/400 can be gained from other machines, most likely PCs. Users with profiles on those systems, and authority to the objects, can get to corporate data on The Four Hundred. Does this concern you? It should if you have a permissive attitude toward object-level authority. Open access is an invitation to disaster. The capability to monitor and restrict network access is built into the AS/400, but as the PowerTech survey points out, it doesn’t get used 66 percent of the time.

    System Auditing

    Another built-in security feature of the AS/400 is its system auditing functionality that tracks security-related events. If you want to know who deleted a file or who gave a user the special authority to access a file or program, the information is available. But only 18 percent of the survey participants are using this tool.

    That sounds like a security oversight of monumental proportions, but there is a fairly good reason of this one. Using the security audit journal is like drinking out of a fire hose–sorry, too much information. So security violations often go undetected because few people have the time to pour over these audits. However, software is available to manage this job, and if you are being audited by a regulatory compliance agency, buying third-party software will save you time and money.

    Security Values

    The final area of security concern is configuring the level of overall system security. The AS/400 has five security level settings: Level 10, 20, 30, 40, and 50. IBM recommends that this setting should be at level 40 or higher because there are several well-known exposures at security level 30, but the survey shows almost one-third of the companies have settings that are less than the IBM recommendation.

    When IT department responsibilities are tied to business success, a company has usually put together a strategic and proactive plan that increases its competitive advantage and lowers its risk. But there is a reason security ranks high on the side of controlling risk. And, as this survey underscores, there’s a lot to be accomplished by no longer ignoring what you’ve ignored for so long.

    “Security is the enemy of convenience and convenience is the enemy of security,” Earl says when talking about why it is ignored by so many companies. Anytime I tell you that your password has to be longer or more complex, that makes your life just a little more complicated and less convenient. That’s why some people view it as a hindrance. It’s one more thing you have to do and often it does not get connected to the bottom line.”

    These are the highlights of the “State of the System i” report. The full report is available here on the PowerTech Web site.

    RELATED STORIES

    System i Security: Lots of Room for Improvement

    Security Still an Issue in 2007 for System i5 Shops

    PowerTech Issues Third Annual State of i5/OS Security Report



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    ProData Computer Services:  Simplify your iT with DBU, DBU RDB, and RDB Connect
    Halcyon Software:  Webinar: How to Survive in IT with a reduced headcount, June 4
    Aberdeen Group:  Take the 2009 ERP in Manufacturing survey, get a free copy of complete report

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    More Idle Talk About IBM or Microsoft Buying SAP Faster Fetching

    Leave a Reply Cancel reply

Volume 9, Number 20 -- May 19, 2009
THIS ISSUE SPONSORED BY:

ARCAD Software
Bytware
Profound Logic Software
Maximum Availability
Guild Companies

Table of Contents

  • Gresham Targets System i Shops with VTL Solution
  • PowerTech Says AS/400 Shops Still Flying in Security Danger Zone
  • New Gen Drives Web Features into Version 7 of BI Suite
  • Raz-Lee Jazzes Up its iSecurity GUI
  • Aldon Supports RDi 7.5 with Change Management Plug-In
  • Vision Helps Australian Pharmaceuticals Optimize DASD
  • K.Lund Offshore Taps Lawson for Rental ERP
  • HarrisData Teams Up with SunGard for Hosting
  • CGC Adds Canadian Payroll Support to Construction Industry App
  • IBM Adds iPhone Support to Lotus Notes Traveler

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle