{"id":1769,"date":"2023-02-21T07:38:38","date_gmt":"2023-02-21T06:38:38","guid":{"rendered":"https:\/\/www.armonie.group\/ibm-i-security-10-major-risks-and-how-to-avoid-them\/"},"modified":"2023-09-14T16:19:51","modified_gmt":"2023-09-14T14:19:51","slug":"ibm-i-security-10-major-risks-and-how-to-avoid-them","status":"publish","type":"post","link":"https:\/\/www.armonie.group\/en\/ibm-i-security-10-major-risks-and-how-to-avoid-them\/","title":{"rendered":"IBM i security: 10 major risks and how to avoid them"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.14.8&#8243; background_color=&#8221;#0c8dc9&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.14.8&#8243; text_font_size=&#8221;20px&#8221; header_font=&#8221;Poppins|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;43px&#8221; header_2_font=&#8221;Poppins||||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#01013A&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;||-16px||false|false&#8221; custom_padding=&#8221;30px|30px||30px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<h2><b>ID-INFO blog<\/b><\/h2>\n<p><strong><\/strong><\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.8&#8243; text_font_size=&#8221;20px&#8221; header_font=&#8221;Poppins|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;43px&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;30px|30px|30px|30px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<h1 class=\"post_link\">Security on IBM i :  <br>10 major risks and how to avoid them<\/h1>\n<p><strong><!-- \/wp:post-content --><\/strong><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.14.8&#8243; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;13px&#8221; text_line_height=&#8221;1.4em&#8221; background_color=&#8221;rgba(13,189,224,0.39)&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;30px|30px|30px|30px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<p><i><span style=\"font-weight: 400;\">Security threats are on the increase. Whether it&#8217;s a cyber attack or a virus, identity theft is becoming more and more common, not to mention the fact that certain vulnerabilities can also lead to data loss without any malicious intent on the part of the user.<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">The IBM i, although particularly secure compared to other platforms, is not 100% risk-free, as Bob Losey tells us.<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">With kind permission of Bob Losay. Sept. 2022.<\/span><\/i><\/p>\n<p class=\"wsc_post_summary\"><\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.armonie.group\/wp-content\/uploads\/2022\/12\/img_art_ibmi_failles_securite.jpg&#8221; title_text=&#8221;Man programming on a computer, office background&#8221; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; filter_saturate=&#8221;0%&#8221; filter_sepia=&#8221;15%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_3,1_3&#8243; _builder_version=&#8221;4.14.8&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#000000&#8243; header_2_font=&#8221;Poppins||||||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_3_font=&#8221;Poppins|300|||||||&#8221; header_3_text_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;]<p><b>As you know, security on IBMi has nothing to do with security on Windows, UNIX or Linux. The aim of this post is to briefly highlight 10 major IBM i security risks and explain what you can do about them.  <\/b><\/p>\n<p><b><\/b><\/p>\n<h2>1. Too many IBM i Operator\/Admin users<\/h2>\n<p><span style=\"font-weight: 400;\">Almost all IBM i systems address too many users with far more authorizations than they need. In fact, many organizations grant access to all database files and objects on the IBM i OS to a colossal number of user profiles. In concrete terms, there&#8217;s nothing to prevent employees from accessing and sharing unauthorized data, or even deleting the entire operating system.<\/span><\/p>\n<p><b>Solution:<\/b><span style=\"font-weight: 400;\">  Make the effort to evaluate user profiles and activities on a regular basis. Standardize profiles with role-based authorizations, keep track of who has access, and keep an eye on employees who gain access in surprising ways.<\/span><br><br><\/p>\n<h2>2. Allow default IBM i passwords<\/h2>\n<p><span style=\"font-weight: 400;\">Users often keep passwords that correspond to their usernames&#8230; BIG MISTAKE. As you probably know, hackers always try to use login credentials whose username and password match or are easier to guess.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This allows hackers to check whether they can access the system (and they often succeed). Your entire IBM i system could then be exploited, or all important and confidential data erased.<\/span><\/p>\n<p><b>Solution:  <\/b><span style=\"font-weight: 400;\">Changing passwords on joining the company and during training is a must to solve this problem. Continuous compliance monitoring also enables reports to be created to determine how many users have default passwords, and to search for appropriate password settings.<\/span><br><br><\/p>\n<h2>3. Ignore compliance rules<\/h2>\n<p><span style=\"font-weight: 400;\">Some organizations fail to properly implement the security measures they need to meet their obligations, because they don&#8217;t master the necessary tools or controls.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Postponing the task means risking sanctions, or hoping that the auditors won&#8217;t detect any problems. Especially since it&#8217;s quite possible that an auditor won&#8217;t realize that the IBM i is not protected against viruses, because he or she doesn&#8217;t understand how the platform works. And it offers administrators a loophole, at least from a legal point of view.<\/span><\/p>\n<p><b>Solution:<\/b><span style=\"font-weight: 400;\">  It&#8217;s essential to be fully aware of the specific requirements your organization needs to meet. From there, you can use appropriate software or other procedures to assure auditors that you are doing everything possible to fully comply with these guidelines and safeguard your data.<\/span><br><br><\/p>\n<h2>4. Using an unsupported version of IBM i<\/h2>\n<p><span style=\"font-weight: 400;\">As with any operating system, not using the latest version can cause problems, especially if you&#8217;re using a version that is no longer supported by the vendor.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Using an obsolete version of IBM i means (often) not having the latest updates for your security tools, and therefore being vulnerable. What&#8217;s more, if your version is too old, you may not be able to get support from IBM.<\/span><\/p>\n<p><b>Solution:<\/b><span style=\"font-weight: 400;\"> The only wise option is to stay up-to-date and upgrade.<\/span><br><br><\/p>\n<h2>5. Rely on menu security<\/h2>\n<p><span style=\"font-weight: 400;\">Green screen menu security offers each user unique options according to their profile. However, there&#8217;s nothing to control in the system, as these are the only places a user can access.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Except that experienced users can easily access areas beyond the menu options. These entry points allow a user to bypass the menu options that are initially displayed.<\/span><\/p>\n<p><b>Solution:  <\/b><span style=\"font-weight: 400;\">It is essential not to rely on the security policies of the menus that users can access via the system. Similarly, you need to pay attention to the other PC interfaces used, and set up an object-level authority.<\/span><br><br><\/p>\n<h2>6. Rely on a single security layer<\/h2>\n<p><span style=\"font-weight: 400;\">Assuming that a PC firewall or antivirus protection offers sufficient security against an attack is misguided. A multi-tiered solution is required, including endpoint management, antivirus protection, firewalls and rigorous user profiles.<\/span><\/p>\n<p><b>Solution:<\/b><span style=\"font-weight: 400;\"> Evaluate your security position from several angles, as malicious users or actors will use any means to impersonate authorized users to gain access to the system.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<h2>7. Do not use multi-factor authentication (MFA) with privileged accounts<\/h2>\n<p><span style=\"font-weight: 400;\">The use of multiple levels of authentication to ensure that you identify the people accessing the IBMi system is becoming increasingly widespread. This is particularly important when working with users with administrative access.<\/span><\/p>\n<p><b>Solution:  <\/b><span style=\"font-weight: 400;\">Some directives, such as PCI DSS, require multi-factor authentication for any IBM i system administrator entering the cardholder data environment. This additional layer of security, combined with other access control measures, can significantly minimize the damage that can be caused by divulged credentials.<\/span><br><br><\/p>\n<h2>8. Enable end-users to have command-line permissions<\/h2>\n<p><span style=\"font-weight: 400;\">Organizations frequently use menus to limit users&#8217; ability to use a command line. However, even the most inexperienced user can cause errors that allow him\/her to access the command line. And they could execute more than 2,000 commands in the IBM i operating system, some of which could have disastrous effects: deleting data, disabling subsystems, even exposing data!<\/span><\/p>\n<p><b>Solution:  <\/b><span style=\"font-weight: 400;\">You need to control the environment in which any IBMi operator can execute commands, such as green screen or FTP. You also need to keep track of what permissions users have, as mentioned in the previous threats.<\/span><br><br><\/p>\n<h2>9. Operation below safety level 40, or even 30<\/h2>\n<p><span style=\"font-weight: 400;\">IBM strongly recommends that you set the security level of your operating system to at least 40. Some users, however, reset the configuration during updates to integrate obsolete programs, with the intention of restoring the security level later. Except they never come back.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is a major vulnerability, as a user could possibly execute a task under another profile, without authorization.<\/span><\/p>\n<p><b>Solution:<\/b><span style=\"font-weight: 400;\">  It&#8217;s essential to reach security level 40, even if it&#8217;s not a quick procedure on IBM i. You therefore need to plan the update and carry out the necessary tests to ensure that no related processes are disrupted.<\/span><br><br><\/p>\n<h2>10. Not having a cyber-attack response plan<\/h2>\n<p><span style=\"font-weight: 400;\">A cyber-attack response plan is not the same as a disaster recovery plan, as each cyber-attack may require a very different response. You&#8217;ll need to determine where the security threat comes from, how to prevent access and determine the best strategy for restoring damage or assessing data loss.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dealing with a virus has nothing to do with a malicious attack that attempts to steal data from your system: in the first case, the server may be irreparably damaged, in the second, it&#8217;s the data that leaks out.<\/span><\/p>\n<p><b>Solution:<\/b><span style=\"font-weight: 400;\"> Make sure you have two separate countermeasures in place to deal with these scenarios, as well as the necessary solutions and communications.<\/span><\/p>\n<p><b>When it comes to IBM i security, there are many options. Unfortunately, many are not specific to IBM i to help you protect your system against data breaches. In fact, many of the security solutions on offer are not specific to IBM i. What&#8217;s more, solution providers often lack the IBM i administrative expertise to provide effective security against data breaches.<\/b><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><b>Find out more at <\/b><a href=\"http:\/\/www.source-data.com\">\n  <b>www.Source-Data.com<\/b>\n<\/a><b>.<\/b><\/p>\n<p><b>Original article in English :  <\/b><\/p>\n<p><span style=\"font-weight: 400;\">https:\/\/www.linkedin.com\/pulse\/10-ibm-i-iseriesas400-security-risks-ways-avoid-them-bob-losey\/<\/span><\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.14.8&#8243; custom_padding=&#8221;|||30px|false|false&#8221; border_width_left=&#8221;1px&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;Montserrat|800|||||||&#8221; header_2_text_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;]<h2>Other articles you might like<\/h2>[\/et_pb_text][et_pb_blog include_categories=&#8221;15&#8243; show_thumbnail=&#8221;off&#8221; show_more=&#8221;on&#8221; show_author=&#8221;off&#8221; show_categories=&#8221;off&#8221; show_excerpt=&#8221;off&#8221; show_pagination=&#8221;off&#8221; offset_number=&#8221;1&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Montserrat|600|||||||&#8221; header_text_color=&#8221;#0C71C3&#8243; header_font_size=&#8221;14px&#8221; meta_font=&#8221;Montserrat||||||||&#8221; meta_font_size=&#8221;11px&#8221; read_more_text_color=&#8221;#0C71C3&#8243; read_more_font_size=&#8221;11px&#8221; border_width_bottom_fullwidth=&#8221;1px&#8221; border_color_bottom_fullwidth=&#8221;#0C71C3&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<!-- \/wp:freeform -->","protected":false},"excerpt":{"rendered":"<p>ID-INFO blog Security on IBM i : 10 major risks and how to avoid them Security threats are on the increase. Whether it&#8217;s a cyber attack or a virus, identity theft is becoming more and more common, not to mention the fact that certain vulnerabilities can also lead to data loss without any malicious intent [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1507,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[57],"tags":[62,59,67,69,71,66,60,64,81,73],"class_list":["post-1769","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-idinfo-en","tag-as-400-en-2","tag-as400-en-2","tag-data-en","tag-data-en-2","tag-data-security","tag-ibm-power","tag-ibmi-en","tag-power-server","tag-risks","tag-security"],"_links":{"self":[{"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/posts\/1769","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/comments?post=1769"}],"version-history":[{"count":4,"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/posts\/1769\/revisions"}],"predecessor-version":[{"id":1804,"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/posts\/1769\/revisions\/1804"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/media\/1507"}],"wp:attachment":[{"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/media?parent=1769"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/categories?post=1769"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/tags?post=1769"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}