SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Lock It Down
Access Control for IBM i
Bill Hammond | Product Marketing Director
Housekeeping
Webinar Audio
• Today’s webcast audio is streamed through your
computer speakers
• If you need technical assistance with the web interface
or audio, please reach out to us using the Q&A box
Questions Welcome
• Submit your questions at any time during the
presentation using the Q&A box. If we don't get to your
question, we will follow-up via email
Recording and slides
• This webinar is being recorded. You will receive an email
following the webinar with a link to the recording and
slides
Agenda
• The growing threat
• Understanding your risks
• Reducing your risks with Access
Control
• System Access
• Authentication
• Elevated Authorities
• Q & A
3
Ransomware attacks
• 51% of companies faced ransomware attacks
• 26% of companies paid the ransom to cybercriminals
• The average ransom amount in 2020 was $180,000
for big companies
• The average ransom amount in 2020 for small
businesses was $6,000
• A set of software tools needed to launch a
ransomware attack costs about $50 on the darknet
• A new ransomware attack is detected every 11 seconds
4
Impact of Covid-19 pandemic
• Initial response to the pandemic was the transfer of a large number
of employees to remote work mode
• The security perimeter became blurred for many companies
• Dramatic rise in malicious sites with the words like “covid” or
“coronavirus” in their domain names
• Many of these rogue websites host ransomware and other malware
that is designed to capture login information
5
Looking for passwords
• A significant part of malicious
operations is devoted to obtaining
passwords.
• Legitimate accounts allow
cybercriminals to remain
undetected in a compromised
system
• Attackers use special tools to steal
logins and passwords processed in
browsers, as well as other places in
the system where cached
information is stored.
6
Understanding
Your Risks
7
Too often risks are neglected
• Lack of a Security Policy
• Lack of regular security health checks (often a regulatory
requirement)
• Lack of expertise – a dedicated security officer doesn’t exist
• Not using qualified external resources to validate security
• No security or penetration testing
• Too many powerful users
• Auditing not turned on
• Audit logs not checked
• Patches not applied
Is ignorance bliss?
Security by obscurity?
8
Thinking the IBM i is
secure by default?
• IBM i often hosts the most critical data
in a corporation.
• IBM i is securable BUT not secured by
default
• Being compliant does not mean you are
secure
• Protecting the well-known interfaces is
not enough for TODAY’s networks
• The IBM i has become a target for
hackers
9
Reducing Your
Risks
10
System Access
Why Secure Access Points?
12
The IBM i is increasingly connected
• Prior to the 1990s, the IBM i was isolated
• In the 1990s IBM opened up the system to the network
• The number of ways the system can be accessed has grown
• Legacy, proprietary protocols now cohabitate with new,
open-source protocols – creating access point headaches
• The worldwide hacker community now recognizes the IBM i
as a high-value target
4 important levels of access must now be secured
• Network access
• Communication port access
• Database access
• Command access
Exit Points and Exit Programs
13
What are exit points and exit programs?
• Exit points and exit programs are powerful tools for access
control
• Introduced in 1994 to the AS/400 in V3R1 of the operating
system
• Exit points provide “hooks” to invoke one or more user-written
programs—called exit programs—for a variety of OS-related
operations
• Exit point programs are registered to particular exit points
How are exit programs used for access control?
• Exit programs can allow or deny access based on parameters
such as permissions, date/time, user profile settings, IP
addresses, etc.
• Command exit points can allow or deny command execution
based on context and parameters
• Exit programs can also trigger actions such as logging access
attempts, disabling user profiles, sending an alert, etc.
Key Features to Look for in
an IBM i Access Control Solution
14
Comprehensive control of external and internal access
• Network access
(FTP, ODBC, JDBC, OLE DB, DDM, DRDA, NetServer, etc.)
• Communication port access
(using ports, IP addresses, sockets - covers SSH, SFTP, SMTP, etc.)
• Database access
(open-source protocols - JSON, Node.js, Python, Ruby, etc.)
• Command access
Powerful, flexible and easy to manage
• Easy to use graphical interface
• Standard configuration easy deployment
• Powerful, flexible rules for controlling access based on conditions such as
date/time, user profile settings, IP addresses, etc.
• Simulation mode for rules testing
• Provides alerts and produces reports
• Logs access data for SIEM integration
Authentication
Complex Password Issues
16
• Should we add more complexity to passwords? Not really.
• Why not? Because we write them down!
• Complex password increase costs and introduce weaknesses:
• Management is complex
• Management is expensive
• Impacts productivity (re-enabling users, password changes, etc.)
• Reliance on passwords alone puts all your eggs in the same
basket!
NIST’s latest Digital Identity Guidelines at
https://pages.nist.gov/800-63-3/
recommend against complex passwords
Why Is Multi-Factor
Authentication Required?
17
Multi-Factor Authentication supports the requirements of numerous
industry and governmental regulations, such as:
• PCI-DSS 3.2 and greater
• 23 NYCRR 500
• GLBA / FFIEC
MFA is also mentioned, or the benefits of MFA are implied, for:
• GDPR
• HIPAA
• Swift Alliance Access
Selective use of MFA is a good Security practice
• Avoids issues with weak passwords
• Avoids issues with complex passwords
You may be required to use multi-factor authentication tomorrow,
if you’re not already using it today.
• SOX
• And more
Multi-Factor Authentication
Adds a Layer of Login Security
18
Multi-Factor Authentication (MFA), sometimes called Two-Factor
Authentication (2FA), uses two or more of the following factors :
• Something you know or a “knowledge factor”
• E.g. user ID, password, PIN, security question
• Something you have or a “possession factor”
• E.g. smartphone, smartcard, token device
• Something you are or an “inherence factor”
• E.g. fingerprint, iris scan, voice recognition
Typical authentication on IBM i uses 2 items of
the same factor – User ID and password.
This is not multi-factor authentication.
Authentication Options
19
Authentication options
beyond the basic factor that
the user knows, are delivered
by:
• Smartphone app
• Email
• Phone call
• SMS/text message (see box)
• Hardware device such as
fobs or tokens
• Biometric device
Authentication services
generate codes delivered
to the user. For example:
• RADIUS compatible (RSA
SecurID, Entrust, Duo,
Vasco, Gemalto, and
more)
• RFC 6238 (Microsoft
Authenticator, Google
Authenticator, Authy,
Yubico, and more)
• Others (TeleSign, and
more)
Use of SMS for Authentication –
PCI DSS relies on industry standards, such as NIST,
ISO, and ANSI, that cover all industries, not just
the payment industry. While NIST currently permits
the use of SMS authentication for MFA, they have
advised that out-of-band authentication using
SMS or voice should be “restricted” as it presents a
security risk.
Key Features to Look for in
an IBM i MFA Solution
20
• Option to integrate with IBM i signon screen
• Ability to integrate MFA with other IBM i applications or
processes
• Multiple authentication options that align with your budget
and current authenticators
• Certification by a standards body (e.g. RSA, NIST)
• Rules that enable MFA to be invoked for specific situations
or user criteria such as:
• Group profiles, Special authorities
• IP addresses, Device types, Dates and times
• And more
• Real risk-based authentication policy (integrated with access
control and elevated authority management capabilities)
Elevated Authorities
What Is Elevated Authority?
22
• A user’s authorities define what they can do on an IBM i system,
including
• menus they can access
• commands they can run and
• actions they can take
• Elevated authorities are those that give users more powerful
privileges
• Some people may refer to elevated authority as privileged access
Why Limit Elevated Authorities
23
• Having too many powerful users leaves the system and data exposed
• Controlling user authorities is required by regulations such as SOX, HIPAA, the
Federal and North American Information Practice Act, GDPR and more
• Compliance auditors require that additional authority be granted only when
needed and only for the time required
• Security best practice is for users to only have the authorities required to do their
jobs
• Even administrators should have their actions monitored (separation of duties) as
a best practice
• Outsiders who obtain credentials will attempt to elevate authority unchecked
unless you have control of that process
Challenges of Managing
Elevated Authority
24
• Elevated authority should only be granted as needed –
and then revoked
• Manually granting and revoking elevated authority is
time consuming and error prone
• A log of the activities of users with elevated authorities
should maintained so their actions can be monitored
• Remember that administrators, who have elevated
authority, also need to have their actions monitored
I need to be
*SYSOPR for this
assignment!
I need
*ALLOBJ to
do my job!
Can I have
*SPLCTL for
my project?
Key Features to Look for in an
IBM i Elevated Authority Solution
25
• Reduces the number of powerful user profiles to satisfy audit
requirements
• Makes it easy to manage requests for elevated authority on
demand
• Reduces risk of unauthorized access to sensitive data
• Produces necessary alerts, reports and a comprehensive audit trail
• Lowers security exposures caused by human error
Q & A
26
27

Weitere ähnliche Inhalte

Was ist angesagt?

Do You Trust Your Machine Learning Outcomes?
 Do You Trust Your Machine Learning Outcomes?  Do You Trust Your Machine Learning Outcomes?
Do You Trust Your Machine Learning Outcomes? Precisely
 
Optimize the Value of Your Mainframe
Optimize the Value of Your MainframeOptimize the Value of Your Mainframe
Optimize the Value of Your MainframePrecisely
 
Kickstart a Data Quality Strategy to Build Trust in Data
Kickstart a Data Quality Strategy to Build Trust in DataKickstart a Data Quality Strategy to Build Trust in Data
Kickstart a Data Quality Strategy to Build Trust in DataPrecisely
 
Peering Through the PDX
Peering Through the PDXPeering Through the PDX
Peering Through the PDXPrecisely
 
The Future of Business Process With Nintex
The Future of Business Process With NintexThe Future of Business Process With Nintex
The Future of Business Process With NintexDavid J Rosenthal
 
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...Precisely
 
Harnessing the Power of Advanced Insurance Analytics Through Property Data
Harnessing the Power of Advanced Insurance Analytics Through Property DataHarnessing the Power of Advanced Insurance Analytics Through Property Data
Harnessing the Power of Advanced Insurance Analytics Through Property DataPrecisely
 
Creating the golden record that makes every click personal
Creating the golden record that makes every click personalCreating the golden record that makes every click personal
Creating the golden record that makes every click personalJean-Michel Franco
 
Building Your Enterprise Data Marketplace with DMX-h
Building Your Enterprise Data Marketplace with DMX-hBuilding Your Enterprise Data Marketplace with DMX-h
Building Your Enterprise Data Marketplace with DMX-hPrecisely
 
Foundational Strategies for Trusted Data: Getting Your Data to the Cloud
Foundational Strategies for Trusted Data: Getting Your Data to the CloudFoundational Strategies for Trusted Data: Getting Your Data to the Cloud
Foundational Strategies for Trusted Data: Getting Your Data to the CloudPrecisely
 
Cloud Computing and Data Governance
Cloud Computing and Data GovernanceCloud Computing and Data Governance
Cloud Computing and Data GovernanceTrillium Software
 
Analytics in the Cloud and the ROI for B2B
Analytics in the Cloud and the ROI for B2BAnalytics in the Cloud and the ROI for B2B
Analytics in the Cloud and the ROI for B2BVeronica Kirn
 
Reusing Kafka Data Structure Between Projects | Laura Schornack and Maureen P...
Reusing Kafka Data Structure Between Projects | Laura Schornack and Maureen P...Reusing Kafka Data Structure Between Projects | Laura Schornack and Maureen P...
Reusing Kafka Data Structure Between Projects | Laura Schornack and Maureen P...HostedbyConfluent
 
Modernize your Infrastructure and Mobilize Your Data
Modernize your Infrastructure and Mobilize Your DataModernize your Infrastructure and Mobilize Your Data
Modernize your Infrastructure and Mobilize Your DataPrecisely
 
Case Manager for Content Management - A Customer's Perspective
Case Manager for Content Management - A Customer's PerspectiveCase Manager for Content Management - A Customer's Perspective
Case Manager for Content Management - A Customer's PerspectiveThe Dayhuff Group
 
Accelerate Innovation with Databricks and Legacy Data
Accelerate Innovation with Databricks and Legacy DataAccelerate Innovation with Databricks and Legacy Data
Accelerate Innovation with Databricks and Legacy DataPrecisely
 
Extend IBM Enterprise Content Management Solutions with Content Navigator
Extend IBM Enterprise Content Management Solutions with Content NavigatorExtend IBM Enterprise Content Management Solutions with Content Navigator
Extend IBM Enterprise Content Management Solutions with Content NavigatorPerficient, Inc.
 
Improving the customer experience using big data customer-centric measurement...
Improving the customer experience using big data customer-centric measurement...Improving the customer experience using big data customer-centric measurement...
Improving the customer experience using big data customer-centric measurement...Business Over Broadway
 

Was ist angesagt? (20)

Do You Trust Your Machine Learning Outcomes?
 Do You Trust Your Machine Learning Outcomes?  Do You Trust Your Machine Learning Outcomes?
Do You Trust Your Machine Learning Outcomes?
 
Optimize the Value of Your Mainframe
Optimize the Value of Your MainframeOptimize the Value of Your Mainframe
Optimize the Value of Your Mainframe
 
Kickstart a Data Quality Strategy to Build Trust in Data
Kickstart a Data Quality Strategy to Build Trust in DataKickstart a Data Quality Strategy to Build Trust in Data
Kickstart a Data Quality Strategy to Build Trust in Data
 
Peering Through the PDX
Peering Through the PDXPeering Through the PDX
Peering Through the PDX
 
The Future of Business Process With Nintex
The Future of Business Process With NintexThe Future of Business Process With Nintex
The Future of Business Process With Nintex
 
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...
Leveraging the Power of the ServiceNow® Platform with Mainframe and IBM i Sys...
 
Harnessing the Power of Advanced Insurance Analytics Through Property Data
Harnessing the Power of Advanced Insurance Analytics Through Property DataHarnessing the Power of Advanced Insurance Analytics Through Property Data
Harnessing the Power of Advanced Insurance Analytics Through Property Data
 
Creating the golden record that makes every click personal
Creating the golden record that makes every click personalCreating the golden record that makes every click personal
Creating the golden record that makes every click personal
 
Building Your Enterprise Data Marketplace with DMX-h
Building Your Enterprise Data Marketplace with DMX-hBuilding Your Enterprise Data Marketplace with DMX-h
Building Your Enterprise Data Marketplace with DMX-h
 
Foundational Strategies for Trusted Data: Getting Your Data to the Cloud
Foundational Strategies for Trusted Data: Getting Your Data to the CloudFoundational Strategies for Trusted Data: Getting Your Data to the Cloud
Foundational Strategies for Trusted Data: Getting Your Data to the Cloud
 
Cloud Computing and Data Governance
Cloud Computing and Data GovernanceCloud Computing and Data Governance
Cloud Computing and Data Governance
 
NG-Brochure
NG-BrochureNG-Brochure
NG-Brochure
 
Analytics in the Cloud and the ROI for B2B
Analytics in the Cloud and the ROI for B2BAnalytics in the Cloud and the ROI for B2B
Analytics in the Cloud and the ROI for B2B
 
Reusing Kafka Data Structure Between Projects | Laura Schornack and Maureen P...
Reusing Kafka Data Structure Between Projects | Laura Schornack and Maureen P...Reusing Kafka Data Structure Between Projects | Laura Schornack and Maureen P...
Reusing Kafka Data Structure Between Projects | Laura Schornack and Maureen P...
 
Modernize your Infrastructure and Mobilize Your Data
Modernize your Infrastructure and Mobilize Your DataModernize your Infrastructure and Mobilize Your Data
Modernize your Infrastructure and Mobilize Your Data
 
Case Manager for Content Management - A Customer's Perspective
Case Manager for Content Management - A Customer's PerspectiveCase Manager for Content Management - A Customer's Perspective
Case Manager for Content Management - A Customer's Perspective
 
Accelerate Innovation with Databricks and Legacy Data
Accelerate Innovation with Databricks and Legacy DataAccelerate Innovation with Databricks and Legacy Data
Accelerate Innovation with Databricks and Legacy Data
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Extend IBM Enterprise Content Management Solutions with Content Navigator
Extend IBM Enterprise Content Management Solutions with Content NavigatorExtend IBM Enterprise Content Management Solutions with Content Navigator
Extend IBM Enterprise Content Management Solutions with Content Navigator
 
Improving the customer experience using big data customer-centric measurement...
Improving the customer experience using big data customer-centric measurement...Improving the customer experience using big data customer-centric measurement...
Improving the customer experience using big data customer-centric measurement...
 

Ähnlich wie Lock it Down: Access Control for IBM i

Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessPrecisely
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iPrecisely
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication Precisely
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataPrecisely
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iPrecisely
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityPrecisely
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iPrecisely
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM IntegrationPrecisely
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?Precisely
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against MalwarePrecisely
 
Compliance technical controls and you rva sec 2019
Compliance technical controls and you   rva sec 2019Compliance technical controls and you   rva sec 2019
Compliance technical controls and you rva sec 2019Derek Banks
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the CloudRichard Diver
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostPrecisely
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...Leif Davidsen
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis Belsis MPhil/MRes/BSc
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowPrecisely
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)Sam Bowne
 

Ähnlich wie Lock it Down: Access Control for IBM i (20)

Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i Access
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM i
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM i
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access Security
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM i
 
IBM i Security SIEM Integration
IBM i Security SIEM IntegrationIBM i Security SIEM Integration
IBM i Security SIEM Integration
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
Compliance technical controls and you rva sec 2019
Compliance technical controls and you   rva sec 2019Compliance technical controls and you   rva sec 2019
Compliance technical controls and you rva sec 2019
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 

Mehr von Precisely

Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenPrecisely
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfPrecisely
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Precisely
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Precisely
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Precisely
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fPrecisely
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsPrecisely
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPPrecisely
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenPrecisely
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsPrecisely
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyPrecisely
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellencePrecisely
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation ManagementPrecisely
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowPrecisely
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckPrecisely
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformancePrecisely
 
Preventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations ManagementPreventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations ManagementPrecisely
 

Mehr von Precisely (20)

Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity Trends
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAP
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIs
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and Precisely
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center Excellence
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar Deck
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
 
Preventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations ManagementPreventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations Management
 

Kürzlich hochgeladen

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Kürzlich hochgeladen (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Lock it Down: Access Control for IBM i

  • 1. Lock It Down Access Control for IBM i Bill Hammond | Product Marketing Director
  • 2. Housekeeping Webinar Audio • Today’s webcast audio is streamed through your computer speakers • If you need technical assistance with the web interface or audio, please reach out to us using the Q&A box Questions Welcome • Submit your questions at any time during the presentation using the Q&A box. If we don't get to your question, we will follow-up via email Recording and slides • This webinar is being recorded. You will receive an email following the webinar with a link to the recording and slides
  • 3. Agenda • The growing threat • Understanding your risks • Reducing your risks with Access Control • System Access • Authentication • Elevated Authorities • Q & A 3
  • 4. Ransomware attacks • 51% of companies faced ransomware attacks • 26% of companies paid the ransom to cybercriminals • The average ransom amount in 2020 was $180,000 for big companies • The average ransom amount in 2020 for small businesses was $6,000 • A set of software tools needed to launch a ransomware attack costs about $50 on the darknet • A new ransomware attack is detected every 11 seconds 4
  • 5. Impact of Covid-19 pandemic • Initial response to the pandemic was the transfer of a large number of employees to remote work mode • The security perimeter became blurred for many companies • Dramatic rise in malicious sites with the words like “covid” or “coronavirus” in their domain names • Many of these rogue websites host ransomware and other malware that is designed to capture login information 5
  • 6. Looking for passwords • A significant part of malicious operations is devoted to obtaining passwords. • Legitimate accounts allow cybercriminals to remain undetected in a compromised system • Attackers use special tools to steal logins and passwords processed in browsers, as well as other places in the system where cached information is stored. 6
  • 8. Too often risks are neglected • Lack of a Security Policy • Lack of regular security health checks (often a regulatory requirement) • Lack of expertise – a dedicated security officer doesn’t exist • Not using qualified external resources to validate security • No security or penetration testing • Too many powerful users • Auditing not turned on • Audit logs not checked • Patches not applied Is ignorance bliss? Security by obscurity? 8
  • 9. Thinking the IBM i is secure by default? • IBM i often hosts the most critical data in a corporation. • IBM i is securable BUT not secured by default • Being compliant does not mean you are secure • Protecting the well-known interfaces is not enough for TODAY’s networks • The IBM i has become a target for hackers 9
  • 12. Why Secure Access Points? 12 The IBM i is increasingly connected • Prior to the 1990s, the IBM i was isolated • In the 1990s IBM opened up the system to the network • The number of ways the system can be accessed has grown • Legacy, proprietary protocols now cohabitate with new, open-source protocols – creating access point headaches • The worldwide hacker community now recognizes the IBM i as a high-value target 4 important levels of access must now be secured • Network access • Communication port access • Database access • Command access
  • 13. Exit Points and Exit Programs 13 What are exit points and exit programs? • Exit points and exit programs are powerful tools for access control • Introduced in 1994 to the AS/400 in V3R1 of the operating system • Exit points provide “hooks” to invoke one or more user-written programs—called exit programs—for a variety of OS-related operations • Exit point programs are registered to particular exit points How are exit programs used for access control? • Exit programs can allow or deny access based on parameters such as permissions, date/time, user profile settings, IP addresses, etc. • Command exit points can allow or deny command execution based on context and parameters • Exit programs can also trigger actions such as logging access attempts, disabling user profiles, sending an alert, etc.
  • 14. Key Features to Look for in an IBM i Access Control Solution 14 Comprehensive control of external and internal access • Network access (FTP, ODBC, JDBC, OLE DB, DDM, DRDA, NetServer, etc.) • Communication port access (using ports, IP addresses, sockets - covers SSH, SFTP, SMTP, etc.) • Database access (open-source protocols - JSON, Node.js, Python, Ruby, etc.) • Command access Powerful, flexible and easy to manage • Easy to use graphical interface • Standard configuration easy deployment • Powerful, flexible rules for controlling access based on conditions such as date/time, user profile settings, IP addresses, etc. • Simulation mode for rules testing • Provides alerts and produces reports • Logs access data for SIEM integration
  • 16. Complex Password Issues 16 • Should we add more complexity to passwords? Not really. • Why not? Because we write them down! • Complex password increase costs and introduce weaknesses: • Management is complex • Management is expensive • Impacts productivity (re-enabling users, password changes, etc.) • Reliance on passwords alone puts all your eggs in the same basket! NIST’s latest Digital Identity Guidelines at https://pages.nist.gov/800-63-3/ recommend against complex passwords
  • 17. Why Is Multi-Factor Authentication Required? 17 Multi-Factor Authentication supports the requirements of numerous industry and governmental regulations, such as: • PCI-DSS 3.2 and greater • 23 NYCRR 500 • GLBA / FFIEC MFA is also mentioned, or the benefits of MFA are implied, for: • GDPR • HIPAA • Swift Alliance Access Selective use of MFA is a good Security practice • Avoids issues with weak passwords • Avoids issues with complex passwords You may be required to use multi-factor authentication tomorrow, if you’re not already using it today. • SOX • And more
  • 18. Multi-Factor Authentication Adds a Layer of Login Security 18 Multi-Factor Authentication (MFA), sometimes called Two-Factor Authentication (2FA), uses two or more of the following factors : • Something you know or a “knowledge factor” • E.g. user ID, password, PIN, security question • Something you have or a “possession factor” • E.g. smartphone, smartcard, token device • Something you are or an “inherence factor” • E.g. fingerprint, iris scan, voice recognition Typical authentication on IBM i uses 2 items of the same factor – User ID and password. This is not multi-factor authentication.
  • 19. Authentication Options 19 Authentication options beyond the basic factor that the user knows, are delivered by: • Smartphone app • Email • Phone call • SMS/text message (see box) • Hardware device such as fobs or tokens • Biometric device Authentication services generate codes delivered to the user. For example: • RADIUS compatible (RSA SecurID, Entrust, Duo, Vasco, Gemalto, and more) • RFC 6238 (Microsoft Authenticator, Google Authenticator, Authy, Yubico, and more) • Others (TeleSign, and more) Use of SMS for Authentication – PCI DSS relies on industry standards, such as NIST, ISO, and ANSI, that cover all industries, not just the payment industry. While NIST currently permits the use of SMS authentication for MFA, they have advised that out-of-band authentication using SMS or voice should be “restricted” as it presents a security risk.
  • 20. Key Features to Look for in an IBM i MFA Solution 20 • Option to integrate with IBM i signon screen • Ability to integrate MFA with other IBM i applications or processes • Multiple authentication options that align with your budget and current authenticators • Certification by a standards body (e.g. RSA, NIST) • Rules that enable MFA to be invoked for specific situations or user criteria such as: • Group profiles, Special authorities • IP addresses, Device types, Dates and times • And more • Real risk-based authentication policy (integrated with access control and elevated authority management capabilities)
  • 22. What Is Elevated Authority? 22 • A user’s authorities define what they can do on an IBM i system, including • menus they can access • commands they can run and • actions they can take • Elevated authorities are those that give users more powerful privileges • Some people may refer to elevated authority as privileged access
  • 23. Why Limit Elevated Authorities 23 • Having too many powerful users leaves the system and data exposed • Controlling user authorities is required by regulations such as SOX, HIPAA, the Federal and North American Information Practice Act, GDPR and more • Compliance auditors require that additional authority be granted only when needed and only for the time required • Security best practice is for users to only have the authorities required to do their jobs • Even administrators should have their actions monitored (separation of duties) as a best practice • Outsiders who obtain credentials will attempt to elevate authority unchecked unless you have control of that process
  • 24. Challenges of Managing Elevated Authority 24 • Elevated authority should only be granted as needed – and then revoked • Manually granting and revoking elevated authority is time consuming and error prone • A log of the activities of users with elevated authorities should maintained so their actions can be monitored • Remember that administrators, who have elevated authority, also need to have their actions monitored I need to be *SYSOPR for this assignment! I need *ALLOBJ to do my job! Can I have *SPLCTL for my project?
  • 25. Key Features to Look for in an IBM i Elevated Authority Solution 25 • Reduces the number of powerful user profiles to satisfy audit requirements • Makes it easy to manage requests for elevated authority on demand • Reduces risk of unauthorized access to sensitive data • Produces necessary alerts, reports and a comprehensive audit trail • Lowers security exposures caused by human error
  • 27. 27

Hinweis der Redaktion

  1. eWeek – May 3, 2021 - New Ransomware Trends Causing Fear in 2021 – David Balaban https://www.eweek.com/security/new-ransomware-trends-causing-fear-in-2021/?utm_medium=email&utm_source=newsletter_it_scoop&utm_campaign=May.07.2021
  2. More than half of companies have transferred from 50% to 100% of their employees to home offices.
  3. 2nd most popular activity used by ransomware gangs after phishing and leave no traces, unlike attacks involving Trojans or exploitation of vulnerabilities…. Many times, a hacked user account can only be identified using behavioral analysis tools