• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Popping The IBM i Security Bubble

    May 27, 2014 Alex Woodie

    As an IBM i professional, you feel safe knowing that your organization has entrusted its data to the most secure business server on the planet. You watch as other companies–Target, eBay, victims of Chinese hackers–scramble into spin-control mode following a breach, confident that will never happen at your shop. If this sounds familiar, you’ve succumbed to a dangerous condition known as “IBM i security bubble-itis.” Let us help you pop it.

    The first step in overcoming this debilitating condition is admitting you have a problem. Like the security blanket your kid won’t give up, your mistaken faith in the inherent superior security of the IBM i platform affords only imaginary protection against evil forces. What you don’t know about IBM i security can very definitely hurt you. You eventually got rid of your kid’s tattered wubbie, and likewise, you eventually must get rid of your misplaced assumptions about IBM i security.

    If your IBM i shop is like most we’ve seen over the years, the inadequacies of your security controls run deep and wide. Some of the most common IBM i security problems include:

    • Too many users are granted too much authority to potentially do bad things on the box
    • Passwords that guard these powerful user profiles are weak and rarely reset
    • Network connection points for FTP, ODBC, and the like are too often left totally open
    • Object-level security–which offers another valuable layer of protection in IBM i and can mask other security deficiencies–is rarely used
    • IBM i security level is frequently set too low

    Nearly all of these problems can be traced to an initial failure to properly configure the IBM i security settings and system values, and an ongoing failure to keep the box secure. Security experts will tell you that the keys to achieving good security are the three Ps of policy, process, and procedure. Give or take, 90 percent of the security battle is establishing a good policy up front and then following the processes and procedures necessary to maintain the requisite level of control.

    The three Ps are all well and good. But perhaps the biggest security hurdle that IBM i shops face is the Big A, as in Awareness.

    IBM i professionals have grown accustomed to thinking of the server as secure, but that kind of thinking is misplaced and dangerous. The yawning lack of awareness of the basics of IBM i security (You never changed your default user passwords? Really? You never thought to guard the FTP exit point? Really?? You don’t even know what an FTP exit point is? Really???) would be slightly amusing if it weren’t so downright scary.

    The consequences of a data breach are high, and getting higher every year. According to a Ponemon Institute study of 315 breaches released by IBM this month, the average cost of a data breach has increased by 15 percent this year to $3.5 million per breach. The average cost per lost or stolen record increased by 9 percent to $145 per record. The costs are even higher in the U.S. (this was a global study).

    The size and number of data breaches appears to be growing, driven by the increasing sophistication of cybercriminals who launch targeted attacks, or “advanced persistent threats,” that use multiple attack vectors and are designed to evade traditional defenses.

    Your IBM i security bubble is false and needs popping.

    Just last week, eBay reported that hackers stole information on 145 million people, including email addresses, passwords, birth dates, and mailing addresses, but no credit card or PayPal information, according to Privacy Rights Clearinghouse. If true, that would be the largest data breach in history–bigger than the 2009 breach of Heartland Payment Systems, which compromised records on 130 million people.

    But it’s the Target breach of 110 million people’s data in December 2013 that has security experts jumpy. There were red flags in that data breach, which was conducted by somebody (allegedly a Russian hacker) who stole the sign-on credentials of a third-party vendor who worked on Target’s systems and then compromised the point of sale system. But nobody was paying attention to the flags.

    The key failure in Target’s case appears to be a breakdown of process. According to a March story in BusinessWeek, Target’s security officers assumed that the flurry of activity generated by a new FireEye intrusion detection systems were false positives. In fact they were true positives.

    “It’s unfortunate for Target. They had the controls in place. I talked to those guys and their security is phenomenal,” says Robin Tatam, director of security technologies at PowerTech, which recently released its 11th annual State of IBM i Security Report. (Spoiler alert: it still sucks).

    “Target had a significant impact in business awareness because it was the first big box retailer to be hit by something so dramatic,” Tatam continues. “It’s giving people the idea that if it can happen to Target, it can happen to us.”

    Don’t be surprised if there are more breaches like Target’s in the near future. Not only do companies and other organizations have to worry about rouge cybercriminal elements, but well-funded attacks from government-backed cyberwarriors as well. The Chinese military, in particular, is seen as the perpetrator behind many attacks against the commercial interests of American corporations, the United States Department of Justice alleged in a lawsuit last week.

    If the specter of Russian hackers and Chinese cyberspies getting access to your servers and data isn’t enough to scare you, then you’re not paying attention. Yorgen Edholm, the CEO of secure file sharing software firm Accellion, wonders what’s next. “Cyber warfare is giving the enterprise community a rude awakening, and organizations are just now starting to learn the lessons from attacks on Target, eBay, and others,” he tells IT Jungle. “There is now an industry built solely for the purpose of targeting vulnerable organizations, so IT needs to boost its efforts with the proper security investments and tools.”

    For you IBM i pros, the key message is that the magical cloak of invisibility (i.e. security through obscurity) that you intentionally or unintentionally relied on is getting thinner every year. It’s true that you wear a lot of different hats–programmer, administrator, operator, analyst, chief bottle washer, security officer–and that IT budgets don’t allow you to hire the expertise you need. But just becoming aware of the potential problems that stem from having extremely poor security is a good first step to eventually fixing it.

    “The IBM i organizations have not traditionally taken it seriously because the reputation of the box is that it’s secure, as opposed to securable. And there’s a big different between the definitions of those two words,” Tatam says. “We’re still not doing what we need to do. [The results of the study] still tells me there’s a general lack of awareness in the i space.”

    RELATED STORIES

    State Of IBM i Security? Dismal As Usual, PowerTech Says

    It’s Time For Security Administrator Roles At IBM i Shops, Skyview Says



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Robot Simplifies Setup of IBM i Message Monitor The Geezer’s Guide to Free-Form RPG, Part 3: Data Structures and More Data Definitions

    Leave a Reply Cancel reply

Volume 24, Number 19 -- May 27, 2014
THIS ISSUE SPONSORED BY:

Infinite Corporation
Maxava
Manta Technologies
CloudFax400
Shield Advanced Solutions

Table of Contents

  • Lining Up Power7+ Versus Power8 Machines With IBM i
  • Skills, IBM i, Power8, And The Gathering Of Clouds
  • Popping The IBM i Security Bubble
  • Mad Dog 21/21: Zigbee And The Waggle Dance
  • IBM i Finds A Place In The Cloud
  • Reader Feedback On We’re Integrated, We’re A Platform
  • IDC Revises 2014 Global IT Spending Projections Downward
  • IBM Has No Retirement Party Planned For Tape
  • Are You A Tactician Or A Visionary?
  • Big Data Accelerates 2013 Software Market; IBM Absent From Top Spots

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle