coffee with carol - best practices for ibm i security administration

24
© HelpSystems. All Rights Reserved. 07/05/2022 1 Top Ten Security Vulnerabilities on IBM i Carol Woodbury VP of Security Services

Upload: helpsystems

Post on 09-Jan-2017

307 views

Category:

Software


2 download

TRANSCRIPT

Page 1: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 1

Top Ten Security Vulnerabilities on IBM i

Carol WoodburyVP of Security Services

Page 2: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 2

Meet Your Presenters

PRESENTER: Carol WoodburyVP of Security Services

HOST: John VanderwallVP of Business Development

Page 3: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 3

Best Practices for the IBM i Security AdministratorABSTRACT: System administrators are often required to play the role of security administrator, whether they like it or not.

Unfortunately, IBM i security tasks often fall to the bottom of the system administrator’s to-do list—and even fall off the list entirely. When security is neglected, it shows in the system’s security configuration reports.

The need for effective security administration is growing, but the number of administrators with the right knowledge and experience is shrinking. Join this session to jumpstart your IBM i security education. Renowned industry expert Carol Woodbury will introduce you to the tasks all IBM i security administrators should be performing.

Page 4: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 4

Why Are We Talking about This?

• When security is not administered, there is significant risk to the system and the data.

• Administrators are so busy, the thought of security is overwhelming.

• Based on years of experience, here are the tasks.

Page 5: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 5

Security Policy

• Content of policy may not be your responsibility, but implementation is.

• Participate in the annual review. (Be an advocate for reducing risk in your organization.) Ensure:– All types of data residing on your systems are accounted for– Your technology is accurately documented in Appendix or

Procedure– New technology is covered, e.g., BYOD– Use of social media is covered

Page 6: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 6

System values

• Ensure they meet security best practices:– IBM i Security Reference– IBM i Security Administration and Compliance– Risk Assessor output

• Where they don’t, evaluate the risk:– Of changing– Of not changing

• Key system values:– QSECURITY– QPWD*– QAUD*– QCRTAUT

Page 7: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 7

Auditing

• Audit, at minimum (have QAUDLVL set to):– *AUTFAIL– *CREATE– *DELETE– *SAVRST– *SECCFG– *SECRUN– *SERVICE– *PTFOPR <- V7R2

• For users with command line access, add *CMD auditing– CHGUSRAUD

• Manage journal receivers:– Have a complete set of receivers– So specific date(s) can easily be retrieved

Page 8: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 8

Managing User Profiles

• Inactive– Look at the last used date

• Passwords– Default– Never-changing (PWDEXPITV)

• Group assignments• Special authorities

– Start creating new profiles with appropriate special authorities • IBM-supplied

Page 9: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 9

Use of IBM-Supplied Profiles

• QSECOFR should only be used to upgrade the operating system, apply PTFs, or use vendor products that won’t work otherwise.– Must have a password but can be set to STATUS(*DISABLED)

• QPGMR should never be used for sign on and is discouraged even as a group profile– Should be password - *NONE

• QSYSOPR should not be used for sign on but may be used as a group– Should be password - *NONE

• QSRV will be used to service the system Should be password - *NONE

• QUSER should not be used for sign on or as a group profile. Should be password - *NONE Cannot be set to status *DISABLED

Monitor - Use CHGUSRAUD to turn on *CMD and *JOBBAS action auditing

Page 10: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 10

Protecting Data

• Determine value of data to the organization• Determine cost of that data being altered, unavailable, lost,

or stolen

• What and how many levels of defense do you need to put in place to reduce the risk to an acceptable level?

Page 11: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 11

Accounting Menu1. Accts Receivable2. Accts Payable3. Check Requests

Data Access Is More Than MenusAccess to data from menus is

tightly controlled

Page 12: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 12

FTP, ODBC, DDM, SocketsAccounting Menu1. Accts Receivable2. Accts Payable3. Check Requests

Users with legitimate command line access,

Operators, DBA, Analysts, Developers

How should data be accessible from outside of the protection of the application logic?

Access to data from menus is tightly controlled

Processes that allow downloads to a PC

Query / SQL

Page 13: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 13

Adopted Authority

• Not dangerous as long as it’s used wisely• Need process in place to review programs that adopt—

especially an *ALLOBJ profile

• Be wary of:– Programs that put up a command line (set use adopted

authority to *NO and user profile to *USER)– Menu options that call an IBM command – WRKSPLF, WRKQRY,

STRSQL (may been to add them to a CL program and set that program to be USEADPAUT(*NO) USRPRF(*USER)

Page 14: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 14

IFS

• Don’t be afraid of the IFS!

• Typically need to:– Identify profiles needing to read or write to the directory.– Set appropriate *PUBLIC authority– Authorized individuals or groups to the directory

• Even without touching objects in the directory … risk is reduced significantly

Page 15: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 15

Reducing the Scope of Your Risk

• Get rid of old:– Profiles– Versions of vendor products– Change management libraries– Copies made of files or programs being changed, e.g., xxxOLD

• If it’s on the system, you have to manage/worry about the security aspects

Page 16: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 16

Save and Restore Considerations

• How often are you saving security data (SAVSECDTA)?– User profiles– Private authorities– Authorization lists

– Note: Reducing the private authorities on your system reduces the SAVSECDTA and RSTAUT times

• No one should have *SAVSYS special authority except Administrators and Operators– Can always save/restore what you own or have authority to

Page 17: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 17

HA Considerations

• Want HA system to be identical to production– Check to see if everything replicated correctly:

• System values• User profiles—including that old profiles have been deleted• Ownership• Authorities—specifically authorization lists

Page 18: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 18

Encryption Requirements

• Data at rest– V7R1 provides easier method for encrypting data

• Data in motion– MUST get sessions encrypted

• Media (including disk)– May need for compliance requirements (disk encryption)– If backup media is lost or stolen but encrypted, may be able

avoid breach notification laws

Page 19: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 19

Stay Current!

• OS level• PTFs• iAccess -> Access Client Solutions

Page 20: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 20

Where Do You Start?

• Perform a Risk (Vulnerability) Assessment– “Security Starts with an Assessment”

• Even if you are reviewing settings on a regular basis, a vulnerability assessment will look at things you’re not considering.

• Like going to a doctor for a physical, the vulnerability assessment should be done by a security expert– You will always check the things you know to check

• Provides you with a list of work items

Page 21: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 21

Start … Somewhere!

Goal: Reduce Risk

Page 22: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 22

Questions?

www.helpsystems.com/skyviewwww.helpsystems.com

800-328-1000 | [email protected]

Page 23: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 23

Data Security Life Cycle

- Managed Security Services- Security Checkup- Penetration Testing- Security Architecture- Remediation

Page 24: Coffee with Carol - Best Practices for IBM i Security Administration

© HelpSystems. All Rights Reserved.05/02/2023 24

Thank You for Joining Us!

PRESENTER: Carol WoodburyVP of Security Services

HOST: John VanderwallVP of Business Development