Learning guide: Steps to a secure System i

Search400.com editorial team

Deb Tart, associate editorThis organized list will guide you along your way to maintaining a secure iSeries system. Undoubtedly, the iSeries is one of the most secure platforms out there, but don't be mistaken in thinking that it is untouchable. Address the basic security issues now and take the proactive steps needed to prevent having your system compromised.
-- Deb Tart, associate editor

   Chapter 1: iSeries security at a glance
   Chapter 2: Setting up user security
   Chapter 3: Setting up resource security
   Chapter 4: Testing & planning iSeries security
   Chapter 5: Understanding security level settings and authorities
   Chapter 6: Monitoring/auditing security
   Chapter 7: General security resources
   Chapter 8: Simply security fun!

;Chapter 1: iSeries security at a glanceReturn to Table of Contents

Getting started with basic system security
Frequently asked questions about basic system security
Keep iSeries security simple
White paper: Best Practices for iSeries Security
Free Book Excerpt: Information Security Best Practices: 205 Basic Rules
Think the iSeries is unhackable? Think again

; Chapter 2: Setting up user security Return to Table of Contents

Identify users that have never logged in
Limiting security officer access
iSeries (AS/400) security: Who's in charge?
Program change control
Resetting the SST user profile
Changing user profile authorities
Planning physical security
Planning security for your applications
Your built-in security consultant -- Free of charge
Planning your overall security strategy
Sufficient authority, but not *ALLOBJ authority
Prevent user profiles from gaining unofficial access
Finding users with passwords the same as the profile
Gain better control over user profiles

; Chapter 3: Setting up resource securityReturn to Table of Contents

Blocking iSeries Object Access
Securing printed output
Webcast: Messaging Security Goes Virtual: Improve Email Security and Lower Costs with Virtual Appliances
Webcast: Remote Office Security Management 101
Expert Podcast: Data Security and Compliance
Take control of your iSeries network security -- part 1 & part 2
Security considerations for your library lists -- part 1 & part 2
Be open -- be secure
E-mail filtering in OS/400 SMTP
Get a better understanding of e-mail security policies
Know what security level your objects are using

; Chapter 4: Testing & planning iSeries securityReturn to Table of Contents

System i security configuration: Restoring
Security configuration: Backup process review
12 security tips in 12 minutes
Webcast: Bridge the Gap: Don't Let Security Get Stuck at the Planning Phase
Creating your iSeries security policy
iSeries security officer's New Year's resolutions
20 ways to improve your system's security
CAPP: What it represents for i5/OS
Is the light on, but the door unlocked? Know where you stand
Tightening iSeries security
Are your backups complete? Make sure
Automate disaster recovery restores

; Chapter 5: Understanding security level settings and authoritiesReturn to Table of Contents

Granting user B the same private authorities as user A
Granting user authority
Limiting user authority in Client Access
Reviewing *PUBLIC authority
Limiting *PUBLIC Access to i5/OS Objects -- part 1 & part 2
Prevent users from changing database files

; Chapter 6: Monitoring/auditing security Return to Table of Contents

Making sense of the security audit journals
Check power user activity
Telnet connections: Are yours secure?
Are all of your System i (iSeries) doors closed? -- part 1
Are all of your System i (iSeries) doors closed? -- part 2
Keeping consultants honest
Keeping programmers honest -- part 1 & part 2
How to check for invalid log-on attempts
Checking for profiles that have default passwords

; Chapter 7: General security resourcesReturn to Table of Contents

System i security issues: Application software package
Can you trust all those trigger programs?
Get questions to your security questions from ITKnowledge Exchange
View ongoing security discussions in Search400.com's ITKnowledge Exchange.
Ask the Expert: Search400.com security expert Carol Woodbury offers security advice
Managing the iSeries Forum: Interact with other administrators
Check out Search400.com's collection of security tips
Free Book Excerpt: Experts' Guide to OS/400 & i5/OS Security
iSeries security and performance issues

; Chapter 8: Simply security fun!Return to Table of Contents

iSeries security -- Fact or Fiction?
Test you security smarts with Search400.com's iSeries security word search

This was first published in March 2007

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.