<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=353316&amp;fmt=gif">

Able-One Blog

IBM i Security: 8 Tips You May Have Overlooked

By Brian Olson, Director IBM Power Server and Security Solutions

Having worked with IBM i customers over the past 25 years, we have seen several trends that has impacted the security of the IBM i environment:

  • Increasing use of network based services to access data on the IBM i system from inside the corporate network
  • Increased connection of the IBM i based applications to the outside world
  • Dramatic increases in cyber-crime, and the negative publicity and impact on corporate brand value, that these exploits can have  
  • Increased focus on, and enforcement of, regulatory compliance, whether SOX/CSOX, PCI or a variety of other standards

IBM i (or AS400 or iSeries if you prefer) has long been viewed as a highly stable and secure platform and as such, the security priorities (and budgets) of organizations have tended to be focused in other areas such Windows server/client platforms and external network access (firewalls). Compounding this, is a general lack of experience in the auditor community of the unique attributes of the IBM i environment, to the point where many audits only contain a cursory review of this platform, and usually from the 1,000 foot level.

Given the fact that the IBM i typically houses critical corporate applications and data, this general lack of attention paid by many organizations to IBM i security is a critical exposure for the hundreds (or thousands) of Canadian organizations that rely on this platform and its applications for their existence. Hence, here are some key tips that every IBM i customer organization should consider.

1. Log and monitor audit journal activity

The IBM i operating system provides audit journals that allow the logging of key system activity. Unfortunately, not all organizations have these audit journals enabled, and if they do, many do not monitor or report/alert on suspicious activity taking place. The sheer size and cryptic nature of these journals can make getting useful security information from this a challenge. Use 3rd party tools to provide this extra usability.

2. Implement exit programs to audit network-based activity

In the last 10-15 years, the use of TCP/IP based services (such as ODBC and FTP) to access data housed in the IBM i has grown exponentially. Traditional access to the AS400 has been through direct attached terminals and managed through menu access controls. OS400 (now called the IBM i operating system) provides exit points to allow this “external” access but does not adequately audit access through these services. 3rd party exit point solutions are a requirement to collect the necessary level of information to satisfy most auditor requirements.

3. Clean up inactive user profiles

Inactive user profiles are defined as profiles that have not been used in the last 30 to 60 days. A surprising number of IBM i shops have a large number of inactive profiles and these can pose a significant security exposure. Regular cleaning of inactive profiles should be a priority and there are tools available to help with the ease the administrative effort of this task and even provide some automated assistance.

4. Don’t confuse compliance with security

Your auditor might have told you that you have met compliance with your internal policies or regulatory policies, but this does not mean you are secure. Security is an ongoing process and mindset that does not end with a positive result on an audit. Understand where your key assets are, what poses the greatest business exposure to your organization, and be proactive in addressing these risks on an ongoing basis.  

5. Audit power user profiles

Every organization has trusted power user profiles that have higher levels of access and control over your critical systems.  However, it is exactly these user profiles that pose the greatest risk should they be compromised. Minimize the number of user profiles with these high authorization levels, and make sure you are auditing all activity on these profiles. These are the profiles that hackers love to get their hands on.   

6. Implement and enforce strong password policies

Ensure that your password policies include frequent expiration of passwords, and the use of a reasonably strong password structure. Ensure you check for the use of default passwords because the IBM i operating system and many applications ship with standard defaults. Hackers love default passwords, so make sure you change them.

7. Use a layered approach to IBM i security

Security of any kind, is all about layering. If one layer gets compromised, the next layer should stop (or at least slow down) the attacker. Make it difficult for the hacker – they love “easy targets”. A single security approach is not enough, even within the IBM i platform. You wouldn’t secure your corporate network with just a firewall, would you?

Your IBM i should at least have strongly implemented object security, auditing of all activity, and even look at encryption for your highly sensitive data. Look at integrated solutions as a way of easing the administrative burden of managing all of these layers.  

layers-of-data-protection

8. Automate security and compliance checking where possible

If security becomes onerous and difficult to manage, for most organizations, things begin to fall between the cracks, or get pushed off to be done “when you have time”. Automate your security practices where possible, or use tools to help ease the administrative burden. Run automated compliance checks for key security policies on a regular basis to ensure that you are still OK. Or if you are not, so you can correct the situation in a timely fashion. Again, 3rd party solutions are available to help you with this automation.

Able-One Systems can provide tools and expertise to help you with any, or all, of the above recommendations. We provide consulting services and products for security and compliance for IBM i, and offer a consulting service for IBM i Assessments called Verify for i. For more information, contact Brian Olson of Able-One at 800-461-2253 ext. 7316 or email brian.olson@ableone.com.

Topics: Security

Mobilegeddon: Turning Google’s Mobile-Friendly Update to Your Advantage

By Eden Watt, Vice President, Application Innovation, Able-One Systems and Dmitry Sergeev, Director, SoftHouse Solutions

Effective April 21, 2015, Google is changing their search algorithms to use mobile-friendliness as a ranking factor in searches. Google's rationale, as outlined on their blog announcement is that when searching “on mobile devices, users should get the most relevant and timely results, no matter if the information lives on mobile-friendly web pages or apps”.

This move by Google is understandable based on the trend where more users are performing searches on mobile devices; in fact, it’s now estimated that 60% of online traffic comes from smartphones and tablets.

mobile users comscore

How the Mobile-Friendly Update Affects Your Company

The change to Google’s search results may have an impact on your web site's placement in search results, which in turn may have a potential effect on revenue and branding, which is why some have termed it "Mobilegeddon". The new algorithm could downgrade the ranking of non mobile-friendly websites, meaning that your competitors with mobile-friendly websites will receive stronger priority in Google’s search rankings, giving them a distinct advantage over companies that have not updated their web site’s mobile capabilities.

How to Adapt to the Mobile-Friendly Update

To avoid any traffic loss or drop in performance, organizations should update their websites to meet the new Google requirements for “mobile-friendliness” which means your website should support responsive design in order to be mobile-friendly.

Responsive design is a design philosophy where the representation and the layout responds or adapts depending upon the layout of the device. The primary reason to keep your design responsive is to deliver a good user experience to a larger user base, and on an array of devices from smartphones, tablets, netbooks with small screens and, of course, laptops and desktops.

responsive web design

Over the last decade, responsive website design has risen in popularity as the preferred method for mobile deployment.

On the Google Developer website, responsive web design is defined as a setup where the server always sends the same HTML code to all devices and CSS is used to alter the rendering of the page on the device. It means that the website gives the browser instructions on how to size and scale the website depending on the device used.

Able-One’s Solution

Our team has developed a procedure we call “Fast Responsive Design Conversion” that contains 3 major steps:
  1. Website assessment. This step will provide an expert conclusion as to the corrections your site needs.
  2. Website redesign. This is a facelift of your website according to the new Google requirements.
  3. Website implementation. Delivery of converted website to your hosting.

The procedure takes one week to one month, depending on the number of pages on your site, the technology the web site is built on, the content management system and the type of access required.

Let’s work together to ensure that Mobilegeddon isn’t a problem for your business. We can ensure you are prepared so you can keep your ranking and make sure Google searchers find your website.

RPG User Experience and Responsive Design - An Interview

by Eden Watt, VP Application Innovation

Today’s manager of application development must juggle managing traditional systems and day to day needs of the business with the challenges of delivering their systems via various interfaces or channels to their users and customers.

It's a challenge that has evolved over time: 

  • in the early 90's, providing interactive screens to transaction processing systems, (with the added bonus of standardizing them, incorporating SAA/CUA design), was a mandate for many RPG and COBOL developers in the AS/400 / IBM i world
  • then came client/server and the need to extend the back end to a Windows GUI interface, perhaps integrated with desktop applications
  • by the late 90's/early 2000's, web browser front ends to enterprise systems became popular for intranet, as well as, extranet, business-to-business, and business-to-consumer ecommerce systems
  • today, the demand for mobile and tablet interfaces is now a key concern, and continues to grow and evolve

The result? Many companies have different areas of their systems developed with different technologies (such as RPG, COBOL, Synon, Windows .net, HTML5, PHP, and more)  - and ALL must continue to thrive and evolve. To encompass all of the current capabilities extends beyond just the user interface and belongs looksoftwaregraphicmore in the realm of user experience and deployment to multiple channels. Considerations for managing a range of user experiences today can include:

  • screen sizes / real estate
  • navigation and on-screen controls
  • use of keyboards, mice, browser controls, touchscreens and voice controls
  • and, perhaps most important: whatever comes next

A key design principle for delivering enterprise applications via these various channels or interfaces is Responsive Design – can you code something once and have the interface dynamically work within various form factors?

This and other topics are discussed in this interview of Nick Hampson, (owner of Cydis Ltd., looksoftare Product Evangelist, and UX Design Expert), by Paul Tuohy from IBM Systems Magazine

 


 Learn more about Application Modernization and looksoftware:

Learn more about Modernization for IBM i  You can also access our webinar-on-demand on "Modernizing and Mobilizing with Open Standards" here: http://info.ableone.com/looksoftware-webinar-on-demand-1

 

Topics: Modernization

Chef vs. Chef? Just kidding! Meeting for the upcoming Flash VDI event

Guest post by Kathy Boulet, Evoke Marketing Group

Coming up this week on July 23rd and 24th:

Able-One, Atlantis Computing and IBM are hosting a pair of exclusive events, giving you the opportunity to learn about their differentiated approach to desktop virtualization, all while enjoying fantastic wines and gourmet food created by the Executive Chef of the McEwan Group: Shen Ousmand.

These are truly events not to be missed!

The details:

Flash VDI Event Locations

The Introductions!

I had the opportunity recently to host a meeting between Chef Mike Eckhardt, Executive Chef of Entertaining Elements, and Chef Shen, as well as McEwan Group Catering Manager, Mario Raposo. Chef Mike provided a gracious tour of the facilities where Chef Shen will be guest chef for our event on Wednesday evening, and all the logistics were ironed out!

 Chef Mike and Chef Shen

We are looking forward to a fantastic time showcasing superior storage and desktop virtualization, together with fantastic food and wine! If you haven't registered as of yet, there are a few more spots left!

What will we be covering at this great event?

Preview exciting new solutions supporting all virtualized workloads & discover how to address today's desktop virtualization challenges:

  • Reduce costs and complexity of storage and networking infrastructure

  • Reduce deployment risks that derail VDI projects

  • Delivery a user experience that is equal to or better than a desktop PC

  • Enable management of VDI at scale - up to tens of thousands of PCs

  • Provide high availability and rapid recovery from failure and natural disasters

  • Cut CAPEX and OPEX costs by supporting up to 20x more users on IBM FlashSystem

  • Optimize server workloads with the Atlantis USX Solution

 

Register Now!

Topics: Infrastructure, Cloud Computing and Hosting

Written by

LinkedIn

Signup for Our Monthly Newsletter