Learning guide: Steps to a secure System i

This organized list will guide you along your way to maintaining a secure iSeries system. Undoubtedly, the iSeries is one of the most secure platforms out there, but don't be mistaken in thinking that it is untouchable. Address the basic security issues now and take the proactive steps needed to prevent having your system compromised.

This organized list will guide you along your way to maintaining a secure iSeries system. Undoubtedly, the iSeries is one of the most secure platforms out there, but don't be mistaken in thinking that it is untouchable. Address the basic security issues now and take the proactive steps needed to prevent having your system compromised.
-- Deb Tart, associate editor


Chapter 1: iSeries security at a glance

Getting started with basic system security
Frequently asked questions about basic system security
Keep iSeries security simple 
White paper: Best Practices for iSeries Security
Free Book Excerpt: Information Security Best Practices: 205 Basic Rules
Think the iSeries is unhackable? Think again 
 

Chapter 2: Setting up user security

Identify users that have never logged in
Limiting security officer access
iSeries (AS/400) security: Who's in charge? 
Program change control
Resetting the SST user profile
Changing user profile authorities
Planning physical security
Planning security for your applications
Your built-in security consultant -- Free of charge 
Planning your overall security strategy
Sufficient authority, but not *ALLOBJ authority
Prevent user profiles from gaining unofficial access
Finding users with passwords the same as the profile
Gain better control over user profiles 
 

Chapter 3: Setting up resource security

Blocking iSeries Object Access 
Securing printed output
Webcast: Messaging Security Goes Virtual: Improve Email Security and Lower Costs with Virtual Appliances 
Webcast: Remote Office Security Management 101 
Expert Podcast: Data Security and Compliance 
Take control of your iSeries network security -- part 1 & part 2
Security considerations for your library lists -- part 1 & part 2
Be open -- be secure
E-mail filtering in OS/400 SMTP
Get a better understanding of e-mail security policies
Know what security level your objects are using
 

Chapter 4: Testing & planning iSeries security

System i security configuration: Restoring
Security configuration: Backup process review
12 security tips in 12 minutes 
Webcast: Bridge the Gap: Don't Let Security Get Stuck at the Planning Phase 
Creating your iSeries security policy
iSeries security officer's New Year's resolutions
20 ways to improve your system's security
CAPP: What it represents for i5/OS
Is the light on, but the door unlocked? Know where you stand
Tightening iSeries security
Are your backups complete? Make sure
Automate disaster recovery restores 
 

Chapter 5: Understanding security level settings and authorities

Granting user B the same private authorities as user A
Granting user authority
Limiting user authority in Client Access
Reviewing *PUBLIC authority
Limiting *PUBLIC Access to i5/OS Objects -- part 1 & part 2 
Prevent users from changing database files
 

Chapter 6: Monitoring/auditing security

Making sense of the security audit journals
Check power user activity
Telnet connections: Are yours secure? 
Are all of your System i (iSeries) doors closed? -- part 1
Are all of your System i (iSeries) doors closed? -- part 2
Keeping consultants honest
Keeping programmers honest -- part 1 & part 2
How to check for invalid log-on attempts
Checking for profiles that have default passwords
 

Chapter 7: General security resources

System i security issues: Application software package
Can you trust all those trigger programs? 
Get questions to your security questions from ITKnowledge Exchange
View ongoing security discussions in Search400.com's ITKnowledge Exchange. 
Ask the Expert: Search400.com security expert Carol Woodbury offers security advice
Managing the iSeries Forum: Interact with other administrators
Check out Search400.com's collection of security tips
Free Book Excerpt: Experts' Guide to OS/400 & i5/OS Security
iSeries security and performance issues
 

Chapter 8: Simply security fun!

iSeries security -- Fact or Fiction?
Test you security smarts with Search400.com's iSeries security word search

This was first published in March 2007

Dig deeper on iSeries system and application security

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchEnterpriseLinux

SearchDataCenter

Close