SlideShare a Scribd company logo
1 of 33
ISACA Annual Conference
                                                                                                             August 24, 2008



                                                                                           Operating Systems Security
                                                                                                                                 OS 400
                                                                                                                     Santosh Satam
                                                                                                           Head – Technical Services




                                                                           © 2008 MIEL eSecurity Pvt Ltd

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                    Education   -   Consulting - Products
Agenda

      •      AS/400 Primer
      •      Operating System Security – OS/400
      •      Case Study
      •      Resources for AS/400 Audit
      •      Q&A




                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      2

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
System-i Evolution

      • Server
                – AS/400™                                         (1988 – 1998)

                – iSeries™                                        (1998 – 2004)

                – i5™                                             (2004 – 2006)

                – System i™                                     (2006)




      • Operating System
                – OS/400                                          (1993 – 2004)

                – i5/OS ™                                         (2004)




                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      3

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
System-i Market

      • 98% of Fortune100 run System i
                –     Source: IBM

      • 400,000 systems installed worldwide
                – 45% US, 35% Europe with 20% Asia
      • 30,000 new systems ship annually
                – Price range from $12,000 to $1 million +
      • 16,000 banks run on the System i


                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      4

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
What is an AS/400 ?

      • Successor to the former S/36 and S/38 midrange
        computers
      • AS/400 is an object-oriented system
      • Everything related to the AS/400 platform is considered
        an object, programs, files, printers, users and databases
        all are objects.
      • Security is built-in, it’s not a separate product
      • First general-purpose computer system to attain a C2
        security rating from the NSA
      • It runs of POWER5 processor.

                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      5

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
I5/OS - Design




                           TIMI - Technology Independent Machine Interface

                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      6

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
Operation System- Flexibility




                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      7

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
I5/OS – Library and Object space




                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      8

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
What to Look for ?

      •      Network access
      •      Program, file and library security
      •      User security
      •      System Authorities
      •      System Security
      •      Auditing and Logging




                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      9

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
Auditor’s Toolbox

                                                                   TOOLBOX
                                                                   • Background information on AS/400
                                                                   • Access to an AS/400 security
                                                                     administrator
                                                                   • Built-in Security Tools




                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      10

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
Auditor’s Toolbox – Security Tools

      • User Security Tools
                – Find out what user profiles have default passwords.
                – Schedule user profiles to be unavailable at certain times of the
                  day or week.
                – Schedule a user profile to be removed when the employee
                  leaves
                – Find out which user profiles have special authorities.
                – Find out which user profiles having invalid sign-on attempts.
      • System Security Tools
                – Compare the settings on your system to the recommended
                  settings.



                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      11

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
Network Access

      • IBM introduced a TCP/IP with version 3.1 of OS/400 in
        1994.
      • OS/400 ships with all TCP/IP services active by default
      • Users can use simple tools such as FTP or ODBC to
        download or upload data between their personal
        computing devices and System-i.
      • Users who can change or delete data + Open servers
        like FTP and ODBC = Disaster
      • IBM introduced exit points for various TCP/IP Servers
        but did not provide exit programs.


                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      12

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
Network Access

      • List of exit points where risk of exposure is high
              Exit Point Server                                   Description
              *DDM                                                Alternate ODBC Server
              *DQSRV                                              Client Data Queue Server
              *FILESRV                                            Remote File Server
              *FTPCLIENT                                          TCP/IP Outbound File Transfer
              *FTPSERVER                                          TCP/IP Inbound File Transfer
              *NDB                                                ODBC & JDBC Native Database
              *RMTSRV                                             Remote Command Server
              *RTVOBJINF                                          ODBC & JDBC Retrieve Object Info
              *SQL                                                ODBC & JDBC Signon
              *SQLSRV 1                                           ODBC & JDBC Server
              *SQLSRV 2                                           ODBC & JDBC Server
              *TELNET                                             TCP/IP Terminal Emulation




                                                                            © 2008 MIEL eSecurity Pvt Ltd                                      13

                                                                                    Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                    Education   -   Consulting - Products
Network Access

      • How to determine the existence of Exit Programs
                – WRKREGINF


      • What information you get:
                – User JOE connected to system XYZ from remote IP, address
                  196.6.3.104 at 10:22 a.m. At 10:24 a.m., he sent a request to download
                  the Payroll file, and at 10:31 a.m., he ran a remote command that
                  attempted to delete his joblog.


      • What should be monitored and Controlled:
                – Services such as FTP, remote command and remote SQL
                – Sys admin should maintain logs of exit point traffic, and review
                  the access rules that control the exit programs.
                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      14

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
Program, file and library security

      • OS/400 paths come in two basic flavors, Traditional Unix paths, and
        OS/400 libraries
      • It is not unusual that the public has rights to add objects to where
        the operating system lives (Library QSYS)
      • Libraries where the user has *CHANGE rights (or better) are a
        serious exposure
      • OS/400 objects (files, programs, etc.) are for everyone (*PUBLIC) to
        have at least change (*CHANGE) rights to all parts of an application.
      • This allows users add or delete entries in the file and to change
        some of the external properties of a file. (like rwx in Unix)




                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      15

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
Program, file and library security

      • How to object authority, to see whether a particular
        system allows too much authority to important
        application objects
                – DSPOBJAUT OBJ(Library_Name /File_Name) OBJTYPE(*FILE)
                – DSPOBJAUT OBJ(QSYS/library name) OBJTYPE(*LIB)


      • What should be monitored and Controlled:
                – Every significant production database, production libraries and source
                  code




                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      16

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
User Security

      • User security is critical as they are the most obvious, and
        the most exploited, method of compromising a system.
      • By default, System-i assigns to new user profiles a
        default password that is the same as the username.
      • Un-monitored user IDs are the easiest way to get into
        any system
      • On OS/400, there is no way to force a special character
        without writing custom code in a password validation exit
        program.



                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      17

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
User Security

      • How to check the system values specific to password
        Settings:
                – System Values DSPSYSVAL SYSVAL(QPWD*)
                – Users with default passwords ANZDFTPWD ACTION(*NONE)
                – Inactive users (DSPUSRPRF USRPRF(*ALL))
      • What should be monitored and Controlled
                – System parameters which determines password expiry period,
                  minimum length of the password, password must be different
                  from previous etc.
                – Powerful users who have default passwords
                – Users who have not used system more than 30 days
                – Invalid Sign on attempts

                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      18

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
System Authorities

      • There are eight types of administrative rights delivered by IBM
                   Authority Name                Special Authority Description
                   *ALLOBJ                       Root- or administrator-level access (very powerful)
                   *SECADM                       Security administrator (can create new user profiles)
                   *IOSYSCFG                     Network services configuration
                   *AUDIT                        Configuration of audit and logging settings
                   *SPLCTL                       Full access to reports and printer spool files
                   *SERVICE                      Hardware administration
                   *JOBCTL                       System operator controls
                   *SAVSYS                       Backup and restore operations

      • The most important of these special authorities is *ALLOBJ
      • Special authorities tend to be handed out liberally


                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      19

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
System Authorities

      • How to check for powerful administrative privileges
        password Settings:
                – Display User profile (DSPUSRPRF USRPRF(*ALL))
      • What should be monitored and Controlled
                – Work to remove the administrate rights from most users, and
                  continuously monitor these rights




                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      20

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
System Security

      • OS/400 provides a variety of methods of securing both
        the operating system itself, and the workstations that are
        connected to it.
      • System values are the foundation of a secure system.
      • System values define things like default public authority,
        default paths, base security level, audit levels, etc.
      • Most important of the system values is QSECURITY
        which defines the overall security level of the operating
        system itself



                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      21

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
System Security

      • How to check for system values:
                – Security related system values (DSPSYSVAL *SEC)
      • What should be monitored and Controlled
                – IBM recommends that all systems should be set to security level
                  40 or higher, and all new systems ship with a default value of 40.
                – Should be verified on a regular basis




                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      22

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
Auditing and Logging

      •      The System Security Audit Journal (QAUDJRN) holds security related event
             log data
      •      The audit journal is a free feature of i5/OS, but it must be turned on and
             properly configured in order to do its job.
      •      Important Audit Value
               Audit Value          Description                                                            Importance

                *AUTFAIL Log Authority failures                                                            High

                *DELETE            Log deletion of objects                                                 High

                *OBJMGT Log object management changes                                                      High

                *SYSMGT            Log changes to certain system management areas                          High

                *SAVRST            Log restore actions to security sensitive objects                       High

               *SECURITY Log security related changes                                                      High

                *SERVICE Log usage of the system and hardware service tools High
                *PGMFAIL Log Program failures caused by security violations                                High


                                                                           © 2008 MIEL eSecurity Pvt Ltd                                                   23

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                                Education   -   Consulting - Products
Auditing and Logging

      • How to check for system values:
                – Check the system value QAUDCTL which specifies what type of
                  auditing is allowed on the system.
                – Check the system value QAUDLVL which specifies what types of
                  security events should be audited.
      • What should be monitored and Controlled
                – It is most practical to conduct regular reviews using a reporting
                  tool since the format of the audit journal makes it difficult to read.




                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      24

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
Case Study – AS/400 Technical Audit

           Company: XYZ, one of the                                                      Application: Core Insurance (Life
           Largest Insurance Company in a                                                and General) Applications,
           SAARC Region                                                                  Finance Accounting system,
           No. Of Users: ~ 1000                                                          Document Archival & Retrieval
           Hardware: AS/400 Model i520                                                   System
           OS: i5OS - v5r3                                                               Database : DB2



                                                         Network Access
                                                         Prog, File and Library Security
                                                         User Security
                                                         System Authorities
                                                         System Security
                                                         Auditing & Logging



                                                                           © 2008 MIEL eSecurity Pvt Ltd                                                25

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                             Education   -   Consulting - Products
System Authorities
           140

                                                                                                                118
           120


           100


             80

                                                                                                                                          XYZ
             60
                                                                                                                              49          Standard

             40
                         23
                                                                     19                   19
             20                                14
                               10                    10                    10                   10                    10           10

              0
                       Users with            Users with            Users with           Users with              Users with   Users with
                        *AllObj              *SECADM             *IOSSYSCFG             *SPLCTL                 *JOBCTL      *SAVSYS




                                                                                © 2008 MIEL eSecurity Pvt Ltd                                                                26

                                                                                        Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                                                  Education   -   Consulting - Products
Inactive Users

                                                                    Inactive Users
                                       200
                                               177
                                       180
                                       160
                                                                 131
                         No of Users




                                       140
                                       120
                                       100                                      93
                                       80                                                          66      No of Users
                                       60
                                       40
                                       20
                                        0
                                             > 3 Months       > 6 Moths    > 9 Months > 12 Months

                                                              Inactive Period



                                                                           © 2008 MIEL eSecurity Pvt Ltd                                                    27

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                                 Education   -   Consulting - Products
Users with default password

                                                          Users with Default Passwords



                                                                                17%
                                                                                                           Users with
                                                                                                           Default
                                                                                                           Passwords

                                                                  83%




                                                                           © 2008 MIEL eSecurity Pvt Ltd                                                   28

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                                Education   -   Consulting - Products
System Security


                         Parameter                     Current Value           Recommended                                 Comments
                     QPWDRQDDIF
                                                                                                            Password reuse cycle
                                                                 0                        1
                                                                                                           There is no limit to the number of
                     QLMTDEVSSN                                  0                        1                concurrent sessions a user can
                                                                                                            Display sign-on information
                      QDSPSGNINF                                 0                        1


                        QINACTITV                           *NONE                        60                 Inactive Job Timeout
                                                                                                            security officer can sign on to any
                                                                                                            workstation.
                     QLMTSECOFR                                  0                        1




                                                                           © 2008 MIEL eSecurity Pvt Ltd                                                                  29

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                                               Education   -   Consulting - Products
Auditing and Logging
                                                                                                           System
                   Audit Value               Description                                                   Value    Importance
                    *AUTFAIL                 Log Authority failures                                        NO       High
                    *DELETE                  Log deletion of objects                                       YES      High
                    *OBJMGT                  Log object management changes                                 YES      High
                    *SYSMGT                  Log changes to certain system management areas                NO       High
                    *SAVRST                  Log restore actions to security sensitive objects             YES      High
                    *SECURITY                Log security related changes                                  YES      High
                    *SERVICE                 Log usage of the system and hardware service tools            NO       High

                    *PGMFAIL                 Log Program failures caused by security violations            YES      High
                    *CREATE                  Log creation of new objects                                   YES      Medium
                    *JOBDTA                  Log job events such as start and stop.                        NO       Medium
                    *PGMADP                  Log usage of programs that adopt authority                    NO       Medium
                    *NETCMN                  Log APPN firewall events                                      NO       Low
                    *OFCSRV                  Log Office Vision/400 security changes                        NO       Low
                    *OPTICAL                 Log usage of optical storage devices                          NO       Low
                    *PRTDTA                  Log printing functions                                        YES      Low
                    *SPLFDTA                 Log usage of spooled files (reports)                          YES      Low

                                                                           © 2008 MIEL eSecurity Pvt Ltd                                                 30

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                              Education   -   Consulting - Products
References

      • IBM-AS/400 Advanced Series: Tips and Tools for Securing Your
        AS/400 [SC41-5300-03]
      • Fortress Rochester: The Inside Story of the IBM Iseries By Frank G.
        Soltis
      • Auditor Resource Site: www.audit400.com
      • Auditing IBM AS/400 and System i By John Earl (ISACA -Journal
        Online)
      • iSeries Security Reference Version 5 [SC41-5302-07]
      • www.isaca.org
      • www.ibm.com




                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      31

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
Conclusion

      • IBM System i is a powerful business platform, but data
        are secure only if the IT department configures the
        system correctly and maintains adequate controls over
        the management of the system and its applications.




                                                                           © 2008 MIEL eSecurity Pvt Ltd                                      32

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                   Education   -   Consulting - Products
Q&A



                                                                                                           Santosh Satam
                                                                                                           ssatam@mielesecurity.com




                                                                           © 2008 MIEL eSecurity Pvt Ltd                                                      34

                                                                                   Confidential
MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA                                                   Education   -   Consulting - Products

More Related Content

Viewers also liked

How to Upgrade to IBM i 7.2
How to Upgrade to IBM i 7.2 How to Upgrade to IBM i 7.2
How to Upgrade to IBM i 7.2 HelpSystems
 
Introduction to the IBM AS/400
Introduction to the IBM AS/400Introduction to the IBM AS/400
Introduction to the IBM AS/400tvlooy
 
Digital Footprint with sound for 8101
Digital Footprint with sound for 8101Digital Footprint with sound for 8101
Digital Footprint with sound for 8101Ilene Dawn Alexander
 
בנק דיסקונט פרידה הורן
בנק דיסקונט   פרידה הורןבנק דיסקונט   פרידה הורן
בנק דיסקונט פרידה הורןAnochi.com.
 
32 14 296b שוק הדיור בישראל
32 14 296b שוק הדיור בישראל 32 14 296b שוק הדיור בישראל
32 14 296b שוק הדיור בישראל Anochi.com.
 
Lessons of rearden final iv tomer ravid
Lessons of rearden final iv tomer ravidLessons of rearden final iv tomer ravid
Lessons of rearden final iv tomer ravidAnochi.com.
 
ויכוח עם פרופ בן נון
ויכוח עם פרופ בן נוןויכוח עם פרופ בן נון
ויכוח עם פרופ בן נוןAnochi.com.
 
Documenting Teaching Effectiveness
Documenting Teaching EffectivenessDocumenting Teaching Effectiveness
Documenting Teaching EffectivenessIlene Dawn Alexander
 
Panel on the future of Electronic Health Records
Panel on the future of Electronic Health RecordsPanel on the future of Electronic Health Records
Panel on the future of Electronic Health RecordsKarim Keshavjee
 
Mmg Presentation Israel September 2014
Mmg Presentation Israel September 2014Mmg Presentation Israel September 2014
Mmg Presentation Israel September 2014Anochi.com.
 
The cost of data quality in EMRs
The cost of data quality in EMRsThe cost of data quality in EMRs
The cost of data quality in EMRsKarim Keshavjee
 
סמינריון צבא התנדבותי מקצועי ת.ה
סמינריון  צבא התנדבותי מקצועי ת.הסמינריון  צבא התנדבותי מקצועי ת.ה
סמינריון צבא התנדבותי מקצועי ת.הAnochi.com.
 
פרופ אורי מרינוב על ההתנגדות לכביש 6
פרופ אורי מרינוב על ההתנגדות לכביש 6פרופ אורי מרינוב על ההתנגדות לכביש 6
פרופ אורי מרינוב על ההתנגדות לכביש 6Anochi.com.
 
פורטוגלי במסמך של בן גוריון באודות הכותבים
פורטוגלי במסמך של בן גוריון   באודות הכותביםפורטוגלי במסמך של בן גוריון   באודות הכותבים
פורטוגלי במסמך של בן גוריון באודות הכותביםAnochi.com.
 
2013.38 roger a. pielke jr.
2013.38 roger a. pielke  jr.2013.38 roger a. pielke  jr.
2013.38 roger a. pielke jr.Anochi.com.
 

Viewers also liked (20)

How to Upgrade to IBM i 7.2
How to Upgrade to IBM i 7.2 How to Upgrade to IBM i 7.2
How to Upgrade to IBM i 7.2
 
Introduction to the IBM AS/400
Introduction to the IBM AS/400Introduction to the IBM AS/400
Introduction to the IBM AS/400
 
Ppbooks
PpbooksPpbooks
Ppbooks
 
Blue Ocean Introduction Brochure
Blue Ocean Introduction BrochureBlue Ocean Introduction Brochure
Blue Ocean Introduction Brochure
 
Digital Footprint with sound for 8101
Digital Footprint with sound for 8101Digital Footprint with sound for 8101
Digital Footprint with sound for 8101
 
בנק דיסקונט פרידה הורן
בנק דיסקונט   פרידה הורןבנק דיסקונט   פרידה הורן
בנק דיסקונט פרידה הורן
 
32 14 296b שוק הדיור בישראל
32 14 296b שוק הדיור בישראל 32 14 296b שוק הדיור בישראל
32 14 296b שוק הדיור בישראל
 
Lessons of rearden final iv tomer ravid
Lessons of rearden final iv tomer ravidLessons of rearden final iv tomer ravid
Lessons of rearden final iv tomer ravid
 
ויכוח עם פרופ בן נון
ויכוח עם פרופ בן נוןויכוח עם פרופ בן נון
ויכוח עם פרופ בן נון
 
Documenting Teaching Effectiveness
Documenting Teaching EffectivenessDocumenting Teaching Effectiveness
Documenting Teaching Effectiveness
 
Shderot
ShderotShderot
Shderot
 
Gmail
GmailGmail
Gmail
 
Panel on the future of Electronic Health Records
Panel on the future of Electronic Health RecordsPanel on the future of Electronic Health Records
Panel on the future of Electronic Health Records
 
Mmg Presentation Israel September 2014
Mmg Presentation Israel September 2014Mmg Presentation Israel September 2014
Mmg Presentation Israel September 2014
 
The cost of data quality in EMRs
The cost of data quality in EMRsThe cost of data quality in EMRs
The cost of data quality in EMRs
 
סמינריון צבא התנדבותי מקצועי ת.ה
סמינריון  צבא התנדבותי מקצועי ת.הסמינריון  צבא התנדבותי מקצועי ת.ה
סמינריון צבא התנדבותי מקצועי ת.ה
 
Gmail15
Gmail15Gmail15
Gmail15
 
פרופ אורי מרינוב על ההתנגדות לכביש 6
פרופ אורי מרינוב על ההתנגדות לכביש 6פרופ אורי מרינוב על ההתנגדות לכביש 6
פרופ אורי מרינוב על ההתנגדות לכביש 6
 
פורטוגלי במסמך של בן גוריון באודות הכותבים
פורטוגלי במסמך של בן גוריון   באודות הכותביםפורטוגלי במסמך של בן גוריון   באודות הכותבים
פורטוגלי במסמך של בן גוריון באודות הכותבים
 
2013.38 roger a. pielke jr.
2013.38 roger a. pielke  jr.2013.38 roger a. pielke  jr.
2013.38 roger a. pielke jr.
 

Similar to AS400 security presentation - ISACA 2008 - for distribution

Oracle Fusion Applications: User Assistance
Oracle Fusion Applications: User Assistance Oracle Fusion Applications: User Assistance
Oracle Fusion Applications: User Assistance Ultan O'Broin
 
Eklavya - Distance Education / Online Programme on Information Security Manag...
Eklavya - Distance Education / Online Programme on Information Security Manag...Eklavya - Distance Education / Online Programme on Information Security Manag...
Eklavya - Distance Education / Online Programme on Information Security Manag...mielmarketing
 
Solution catalog PT DAYA CIPTA MANDIRI SOLUSI - AGUSTUS 2015
Solution catalog PT DAYA CIPTA MANDIRI SOLUSI - AGUSTUS 2015Solution catalog PT DAYA CIPTA MANDIRI SOLUSI - AGUSTUS 2015
Solution catalog PT DAYA CIPTA MANDIRI SOLUSI - AGUSTUS 2015Fanky Christian
 
how to secure web applications with owasp - isaca sep 2009 - for distribution
how to secure web applications  with owasp - isaca sep 2009 - for distributionhow to secure web applications  with owasp - isaca sep 2009 - for distribution
how to secure web applications with owasp - isaca sep 2009 - for distributionSantosh Satam
 
Security architecture best practices
Security architecture best practicesSecurity architecture best practices
Security architecture best practicesAspire Systems
 
Smart Ims Presentation 01122009
Smart Ims Presentation 01122009Smart Ims Presentation 01122009
Smart Ims Presentation 01122009Ayub Shaik
 
Moodle Development Moodleposium 7th September 2009
Moodle Development Moodleposium 7th September 2009Moodle Development Moodleposium 7th September 2009
Moodle Development Moodleposium 7th September 2009Martin Dougiamas
 
Real World Identity Managment
Real World Identity ManagmentReal World Identity Managment
Real World Identity ManagmentJohn Lewis
 
Melstar Presentation
Melstar PresentationMelstar Presentation
Melstar PresentationShelly Raina
 
Synopsis on ulip upated
Synopsis on ulip upatedSynopsis on ulip upated
Synopsis on ulip upatedPrem Kumar
 
Mavis Computel - Company Profile
Mavis Computel - Company ProfileMavis Computel - Company Profile
Mavis Computel - Company ProfileChizaram Ucheaga
 
Taneja grouptechnologyvalidation scalecomputing
Taneja grouptechnologyvalidation scalecomputingTaneja grouptechnologyvalidation scalecomputing
Taneja grouptechnologyvalidation scalecomputingAccenture
 
Building An SOA To Power The Smart Grid
Building An SOA To Power The Smart GridBuilding An SOA To Power The Smart Grid
Building An SOA To Power The Smart Gridandrescarvallo
 

Similar to AS400 security presentation - ISACA 2008 - for distribution (20)

Oracle Fusion Applications: User Assistance
Oracle Fusion Applications: User Assistance Oracle Fusion Applications: User Assistance
Oracle Fusion Applications: User Assistance
 
Eklavya - Distance Education / Online Programme on Information Security Manag...
Eklavya - Distance Education / Online Programme on Information Security Manag...Eklavya - Distance Education / Online Programme on Information Security Manag...
Eklavya - Distance Education / Online Programme on Information Security Manag...
 
Solution catalog PT DAYA CIPTA MANDIRI SOLUSI - AGUSTUS 2015
Solution catalog PT DAYA CIPTA MANDIRI SOLUSI - AGUSTUS 2015Solution catalog PT DAYA CIPTA MANDIRI SOLUSI - AGUSTUS 2015
Solution catalog PT DAYA CIPTA MANDIRI SOLUSI - AGUSTUS 2015
 
3.easy gurukul overview
3.easy gurukul overview3.easy gurukul overview
3.easy gurukul overview
 
how to secure web applications with owasp - isaca sep 2009 - for distribution
how to secure web applications  with owasp - isaca sep 2009 - for distributionhow to secure web applications  with owasp - isaca sep 2009 - for distribution
how to secure web applications with owasp - isaca sep 2009 - for distribution
 
Security architecture best practices
Security architecture best practicesSecurity architecture best practices
Security architecture best practices
 
Smart Ims Presentation 01122009
Smart Ims Presentation 01122009Smart Ims Presentation 01122009
Smart Ims Presentation 01122009
 
Lssic
LssicLssic
Lssic
 
Moodle Development Moodleposium 7th September 2009
Moodle Development Moodleposium 7th September 2009Moodle Development Moodleposium 7th September 2009
Moodle Development Moodleposium 7th September 2009
 
Real World Identity Managment
Real World Identity ManagmentReal World Identity Managment
Real World Identity Managment
 
Melstar Presentation
Melstar PresentationMelstar Presentation
Melstar Presentation
 
Synopsis on ulip upated
Synopsis on ulip upatedSynopsis on ulip upated
Synopsis on ulip upated
 
Mavis Computel - Company Profile
Mavis Computel - Company ProfileMavis Computel - Company Profile
Mavis Computel - Company Profile
 
Taneja grouptechnologyvalidation scalecomputing
Taneja grouptechnologyvalidation scalecomputingTaneja grouptechnologyvalidation scalecomputing
Taneja grouptechnologyvalidation scalecomputing
 
HANEESH
HANEESHHANEESH
HANEESH
 
Yogesh kamra
Yogesh kamraYogesh kamra
Yogesh kamra
 
Uitspl profile
Uitspl   profileUitspl   profile
Uitspl profile
 
Maples esm technologies
Maples esm technologiesMaples esm technologies
Maples esm technologies
 
UM ICT Road Map
UM ICT Road MapUM ICT Road Map
UM ICT Road Map
 
Building An SOA To Power The Smart Grid
Building An SOA To Power The Smart GridBuilding An SOA To Power The Smart Grid
Building An SOA To Power The Smart Grid
 

Recently uploaded

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

AS400 security presentation - ISACA 2008 - for distribution

  • 1. ISACA Annual Conference August 24, 2008 Operating Systems Security OS 400 Santosh Satam Head – Technical Services © 2008 MIEL eSecurity Pvt Ltd Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 2. Agenda • AS/400 Primer • Operating System Security – OS/400 • Case Study • Resources for AS/400 Audit • Q&A © 2008 MIEL eSecurity Pvt Ltd 2 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 3. System-i Evolution • Server – AS/400™ (1988 – 1998) – iSeries™ (1998 – 2004) – i5™ (2004 – 2006) – System i™ (2006) • Operating System – OS/400 (1993 – 2004) – i5/OS ™ (2004) © 2008 MIEL eSecurity Pvt Ltd 3 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 4. System-i Market • 98% of Fortune100 run System i – Source: IBM • 400,000 systems installed worldwide – 45% US, 35% Europe with 20% Asia • 30,000 new systems ship annually – Price range from $12,000 to $1 million + • 16,000 banks run on the System i © 2008 MIEL eSecurity Pvt Ltd 4 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 5. What is an AS/400 ? • Successor to the former S/36 and S/38 midrange computers • AS/400 is an object-oriented system • Everything related to the AS/400 platform is considered an object, programs, files, printers, users and databases all are objects. • Security is built-in, it’s not a separate product • First general-purpose computer system to attain a C2 security rating from the NSA • It runs of POWER5 processor. © 2008 MIEL eSecurity Pvt Ltd 5 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 6. I5/OS - Design TIMI - Technology Independent Machine Interface © 2008 MIEL eSecurity Pvt Ltd 6 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 7. Operation System- Flexibility © 2008 MIEL eSecurity Pvt Ltd 7 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 8. I5/OS – Library and Object space © 2008 MIEL eSecurity Pvt Ltd 8 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 9. What to Look for ? • Network access • Program, file and library security • User security • System Authorities • System Security • Auditing and Logging © 2008 MIEL eSecurity Pvt Ltd 9 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 10. Auditor’s Toolbox TOOLBOX • Background information on AS/400 • Access to an AS/400 security administrator • Built-in Security Tools © 2008 MIEL eSecurity Pvt Ltd 10 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 11. Auditor’s Toolbox – Security Tools • User Security Tools – Find out what user profiles have default passwords. – Schedule user profiles to be unavailable at certain times of the day or week. – Schedule a user profile to be removed when the employee leaves – Find out which user profiles have special authorities. – Find out which user profiles having invalid sign-on attempts. • System Security Tools – Compare the settings on your system to the recommended settings. © 2008 MIEL eSecurity Pvt Ltd 11 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 12. Network Access • IBM introduced a TCP/IP with version 3.1 of OS/400 in 1994. • OS/400 ships with all TCP/IP services active by default • Users can use simple tools such as FTP or ODBC to download or upload data between their personal computing devices and System-i. • Users who can change or delete data + Open servers like FTP and ODBC = Disaster • IBM introduced exit points for various TCP/IP Servers but did not provide exit programs. © 2008 MIEL eSecurity Pvt Ltd 12 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 13. Network Access • List of exit points where risk of exposure is high Exit Point Server Description *DDM Alternate ODBC Server *DQSRV Client Data Queue Server *FILESRV Remote File Server *FTPCLIENT TCP/IP Outbound File Transfer *FTPSERVER TCP/IP Inbound File Transfer *NDB ODBC & JDBC Native Database *RMTSRV Remote Command Server *RTVOBJINF ODBC & JDBC Retrieve Object Info *SQL ODBC & JDBC Signon *SQLSRV 1 ODBC & JDBC Server *SQLSRV 2 ODBC & JDBC Server *TELNET TCP/IP Terminal Emulation © 2008 MIEL eSecurity Pvt Ltd 13 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 14. Network Access • How to determine the existence of Exit Programs – WRKREGINF • What information you get: – User JOE connected to system XYZ from remote IP, address 196.6.3.104 at 10:22 a.m. At 10:24 a.m., he sent a request to download the Payroll file, and at 10:31 a.m., he ran a remote command that attempted to delete his joblog. • What should be monitored and Controlled: – Services such as FTP, remote command and remote SQL – Sys admin should maintain logs of exit point traffic, and review the access rules that control the exit programs. © 2008 MIEL eSecurity Pvt Ltd 14 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 15. Program, file and library security • OS/400 paths come in two basic flavors, Traditional Unix paths, and OS/400 libraries • It is not unusual that the public has rights to add objects to where the operating system lives (Library QSYS) • Libraries where the user has *CHANGE rights (or better) are a serious exposure • OS/400 objects (files, programs, etc.) are for everyone (*PUBLIC) to have at least change (*CHANGE) rights to all parts of an application. • This allows users add or delete entries in the file and to change some of the external properties of a file. (like rwx in Unix) © 2008 MIEL eSecurity Pvt Ltd 15 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 16. Program, file and library security • How to object authority, to see whether a particular system allows too much authority to important application objects – DSPOBJAUT OBJ(Library_Name /File_Name) OBJTYPE(*FILE) – DSPOBJAUT OBJ(QSYS/library name) OBJTYPE(*LIB) • What should be monitored and Controlled: – Every significant production database, production libraries and source code © 2008 MIEL eSecurity Pvt Ltd 16 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 17. User Security • User security is critical as they are the most obvious, and the most exploited, method of compromising a system. • By default, System-i assigns to new user profiles a default password that is the same as the username. • Un-monitored user IDs are the easiest way to get into any system • On OS/400, there is no way to force a special character without writing custom code in a password validation exit program. © 2008 MIEL eSecurity Pvt Ltd 17 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 18. User Security • How to check the system values specific to password Settings: – System Values DSPSYSVAL SYSVAL(QPWD*) – Users with default passwords ANZDFTPWD ACTION(*NONE) – Inactive users (DSPUSRPRF USRPRF(*ALL)) • What should be monitored and Controlled – System parameters which determines password expiry period, minimum length of the password, password must be different from previous etc. – Powerful users who have default passwords – Users who have not used system more than 30 days – Invalid Sign on attempts © 2008 MIEL eSecurity Pvt Ltd 18 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 19. System Authorities • There are eight types of administrative rights delivered by IBM Authority Name Special Authority Description *ALLOBJ Root- or administrator-level access (very powerful) *SECADM Security administrator (can create new user profiles) *IOSYSCFG Network services configuration *AUDIT Configuration of audit and logging settings *SPLCTL Full access to reports and printer spool files *SERVICE Hardware administration *JOBCTL System operator controls *SAVSYS Backup and restore operations • The most important of these special authorities is *ALLOBJ • Special authorities tend to be handed out liberally © 2008 MIEL eSecurity Pvt Ltd 19 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 20. System Authorities • How to check for powerful administrative privileges password Settings: – Display User profile (DSPUSRPRF USRPRF(*ALL)) • What should be monitored and Controlled – Work to remove the administrate rights from most users, and continuously monitor these rights © 2008 MIEL eSecurity Pvt Ltd 20 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 21. System Security • OS/400 provides a variety of methods of securing both the operating system itself, and the workstations that are connected to it. • System values are the foundation of a secure system. • System values define things like default public authority, default paths, base security level, audit levels, etc. • Most important of the system values is QSECURITY which defines the overall security level of the operating system itself © 2008 MIEL eSecurity Pvt Ltd 21 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 22. System Security • How to check for system values: – Security related system values (DSPSYSVAL *SEC) • What should be monitored and Controlled – IBM recommends that all systems should be set to security level 40 or higher, and all new systems ship with a default value of 40. – Should be verified on a regular basis © 2008 MIEL eSecurity Pvt Ltd 22 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 23. Auditing and Logging • The System Security Audit Journal (QAUDJRN) holds security related event log data • The audit journal is a free feature of i5/OS, but it must be turned on and properly configured in order to do its job. • Important Audit Value Audit Value Description Importance *AUTFAIL Log Authority failures High *DELETE Log deletion of objects High *OBJMGT Log object management changes High *SYSMGT Log changes to certain system management areas High *SAVRST Log restore actions to security sensitive objects High *SECURITY Log security related changes High *SERVICE Log usage of the system and hardware service tools High *PGMFAIL Log Program failures caused by security violations High © 2008 MIEL eSecurity Pvt Ltd 23 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 24. Auditing and Logging • How to check for system values: – Check the system value QAUDCTL which specifies what type of auditing is allowed on the system. – Check the system value QAUDLVL which specifies what types of security events should be audited. • What should be monitored and Controlled – It is most practical to conduct regular reviews using a reporting tool since the format of the audit journal makes it difficult to read. © 2008 MIEL eSecurity Pvt Ltd 24 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 25. Case Study – AS/400 Technical Audit Company: XYZ, one of the Application: Core Insurance (Life Largest Insurance Company in a and General) Applications, SAARC Region Finance Accounting system, No. Of Users: ~ 1000 Document Archival & Retrieval Hardware: AS/400 Model i520 System OS: i5OS - v5r3 Database : DB2 Network Access Prog, File and Library Security User Security System Authorities System Security Auditing & Logging © 2008 MIEL eSecurity Pvt Ltd 25 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 26. System Authorities 140 118 120 100 80 XYZ 60 49 Standard 40 23 19 19 20 14 10 10 10 10 10 10 0 Users with Users with Users with Users with Users with Users with *AllObj *SECADM *IOSSYSCFG *SPLCTL *JOBCTL *SAVSYS © 2008 MIEL eSecurity Pvt Ltd 26 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 27. Inactive Users Inactive Users 200 177 180 160 131 No of Users 140 120 100 93 80 66 No of Users 60 40 20 0 > 3 Months > 6 Moths > 9 Months > 12 Months Inactive Period © 2008 MIEL eSecurity Pvt Ltd 27 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 28. Users with default password Users with Default Passwords 17% Users with Default Passwords 83% © 2008 MIEL eSecurity Pvt Ltd 28 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 29. System Security Parameter Current Value Recommended Comments QPWDRQDDIF Password reuse cycle 0 1 There is no limit to the number of QLMTDEVSSN 0 1 concurrent sessions a user can Display sign-on information QDSPSGNINF 0 1 QINACTITV *NONE 60 Inactive Job Timeout security officer can sign on to any workstation. QLMTSECOFR 0 1 © 2008 MIEL eSecurity Pvt Ltd 29 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 30. Auditing and Logging System Audit Value Description Value Importance *AUTFAIL Log Authority failures NO High *DELETE Log deletion of objects YES High *OBJMGT Log object management changes YES High *SYSMGT Log changes to certain system management areas NO High *SAVRST Log restore actions to security sensitive objects YES High *SECURITY Log security related changes YES High *SERVICE Log usage of the system and hardware service tools NO High *PGMFAIL Log Program failures caused by security violations YES High *CREATE Log creation of new objects YES Medium *JOBDTA Log job events such as start and stop. NO Medium *PGMADP Log usage of programs that adopt authority NO Medium *NETCMN Log APPN firewall events NO Low *OFCSRV Log Office Vision/400 security changes NO Low *OPTICAL Log usage of optical storage devices NO Low *PRTDTA Log printing functions YES Low *SPLFDTA Log usage of spooled files (reports) YES Low © 2008 MIEL eSecurity Pvt Ltd 30 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 31. References • IBM-AS/400 Advanced Series: Tips and Tools for Securing Your AS/400 [SC41-5300-03] • Fortress Rochester: The Inside Story of the IBM Iseries By Frank G. Soltis • Auditor Resource Site: www.audit400.com • Auditing IBM AS/400 and System i By John Earl (ISACA -Journal Online) • iSeries Security Reference Version 5 [SC41-5302-07] • www.isaca.org • www.ibm.com © 2008 MIEL eSecurity Pvt Ltd 31 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 32. Conclusion • IBM System i is a powerful business platform, but data are secure only if the IT department configures the system correctly and maintains adequate controls over the management of the system and its applications. © 2008 MIEL eSecurity Pvt Ltd 32 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products
  • 33. Q&A Santosh Satam ssatam@mielesecurity.com © 2008 MIEL eSecurity Pvt Ltd 34 Confidential MUMBAI PUNE AHMEDABAD  BANGALORE  HYDERABAD  CHENNAI  UK  UAE USA Education - Consulting - Products