New IBM i Security Study Reveals User Provisioning Oversight and Network Access Exposures

Compliance / Privacy
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

PowerTech, a division of Help/Systems, announces the release of the 2013 "State of IBM i Security Study."

 

The 2013 findings show that IBM i user provisioning is a significant source of vulnerability, with averages that include:

  • 79 users had default passwords—50 percent of which are enabled for use
  • 197 enabled users had command line permissions
  • 31 servers didn't require users to change passwords
  • 9 servers permitted an unlimited number of sign-on attempts

 

"Every year I expect the results to improve," explained Robin Tatam, PowerTech Director of Security Technologies and the study's author. "But 10 years after the first release, we are still finding vulnerabilities from poor profile management and little to no IBM i network security."

 

In addition to IBM i user provisioning errors, the study also found that 79 percent of servers don't monitor network access, which means that anyone with an enabled user profile can directly access business-critical data via interfaces such as FTP and ODBC without authorization.

 

The 2013 findings were compiled from over 100 Compliance Assessment audits on IBM i servers of varying sizes and across multiple industries, including financial, retail, and manufacturing.

"It's critical to recognize that security for the server does not come preconfigured," said Tatam. "IBM i remains one of the most securable platforms, but this 'load-and-go' perception puts organizations at risk for data loss, fraud, or worse."

 

Tatam emphasized that the weaknesses identified in the study can—and should be—corrected with proper configuration settings, administration, and an IBM i security policy.

0 0

The realm of cybersecurity and automation is always changing, and we’re evolving right alongside it. Say hello to Fortra, the new face of HelpSystems. We’re bringing you the same people-first support you’ve come to expect from HelpSystems, only now we’ve been Fortra-fied with the purpose of providing you with exceptional protection and peace of mind along every step of your journey. 

Our team of expert problem solvers is ready to find answers to your organization’s toughest problems, and our best-in-class portfolio ensures that we’ll land on an integrated, scalable solution that’s right for you. 

We’re tenacious in our pursuit of a stronger, simpler future for cybersecurity. 

Who’s with us?

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  •  

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: