23
Mon, Dec
3 New Articles

Tips for Auditing an IBM i

IBM i (OS/400, i5/OS)
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

In this article, Carol describes the system values, user profile attributes, and access control settings she'd recommend that auditors pay attention to.

I’m dedicating this article to auditors. I’ve found that many auditors have either never heard of IBM i or, if they have, don’t know how to audit it properly—that is, they miss key elements, or they use checklists developed 10 or more years ago, and the settings to be compared are often irrelevant or inaccurate. The capabilities of this operating system are vast, and the need to ensure the security principles of confidentiality, availability, and integrity apply just as they do on other operating systems. Let's take a look.

What Should You Be Examining?

There are key areas of the system that need to be examined. I’m not going to explain the details of each as that’s been done in other parts of this book, but here’s the list that I’d suggest you examine to ensure they’re set to best practices:

System Values

  • QSECURITY
  • QPWDLVL
  • QPWDRULES or the other, individual system values that define password composition
  • QPWDEXPITV
  • QMAXSIGN
  • QAUDCTL and QAUDLVL
  • QSSL*—Specifically QSSLPCL to ensure only strong protocols are in use
  • QCRTAUT—Ensure it’s never set to *ALL, meaning all newly created objects are created with the default (*PUBLIC) authority set to *ALL

While there are many other security-related system values, these are the ones that are critical to ensuring a secure system. For example, if QSECURITY is set to level 20 or 30, users can easily elevate their own privileges at will and neither operating system nor data integrity is guaranteed. If you are going to state that the audit of your client includes data integrity and/or confidentiality, the partition must be running at level 40 or 50. Period.

User Profile Attributes

  • Passwords
    • Default Passwords—No valid excuse exists for profiles having a default password (a password that’s the same as the user profile name).
    • PASSWORD(*NONE)—Note that this is actually a good security measure and is not a vulnerability on IBM i (as it is on some operating systems). Profiles without a password cannot be used for signon or a connection to the system.
  • Special Authorities—The capabilities provided by each special authority are described in Chapter 4. Assignment of each special authority needs careful examination. A special authority should not be assigned unless that user’s job function requires it. Most organizations have not implemented role-based access; therefore, many special authorities have been over-assigned. Often this occurs because an existing user’s profile is copied, rather than copying a “template” that has been configured with least privilege access and then modifying the profile accordingly.

Obviously, *ALLOBJ special authority is the capability to be scrutinized most. That’s because it provides *ALL authority to every object (file, command, program, library, directory, etc.) on the system. Considering least-privilege access, the only roles that should have *ALLOBJ are that of the system and security administrators. And please note, you must allow some profiles to have this authority! *ALLOBJ cannot be removed from all profiles. The OS requires the profile running some administrative tasks to have this special authority. And while there are vendor products that allow one to elevate one’s privileges—eliminating the need to have *ALLOBJ assigned to some profiles—they only work well in the “green-screen” environment. IBM ships some features that are available only in the Access Client Solutions (ACS) or Navigator for i browser interfaces; therefore, *ALLOBJ must be assigned directly to the profiles using these interfaces. If you insist on having *ALLOBJ removed, system administrators either will not be able to perform their jobs or will be forced into using the system-supplied, all-powerful profile QSECOFR, and that is not appropriate. QSECOFR should not be used for routine tasks. It should be used only to upgrade the operating system. Bottom line is that a small number of user profiles will need to have *ALLOBJ directly assigned to their profile to allow them to perform their system administrative duties.  

  • Group and Supplemental Groups—Don’t just look at the capabilities of the profile named as a user’s group profile. Make sure to also look at the profiles named in the supplemental group attribute. You must sum up the capabilities given to all of a user’s groups to determine the full capabilities granted to that user. Remember that special authorities assigned to the group(s) filter down to all of the members. For example, *ALLOBJ special authority assigned at the group, is, in effect, given to all members of that group. The same with private authorities and object ownership. If the group owns an object, all members, in effect, own the object and therefore have all rights to the object.
  • Limited Capability—Most users should be set to LMTCPB(*YES), meaning that if they can get to a command line, they can run only the commands that are allowed to be run by a limited user. By default, only a handful of commands are shipped with this configuration—commands such as SIGNOFF, Display Message (DSPMSG), etc. My goal with our clients is to have no more than 100 profiles set to LMTCPB(*YES) on their production partitions (this number includes IBM-supplied as well as vendor profiles). Development and QA partitions typically have more, and that’s usually appropriate for that type of system. This number may also be inflated if the organization has hired an outside vendor to help them manage their system. Each vendor profile will typically have administrator rights (i.e., *ALLOBJ special authority) as well as be set to limited *NO so they can manage the system.
  • Password Expiration Interval—This is one of the attributes that can be overridden at the user profile level. On occasion, I see a reasonable expiration interval set at the system value (QPWDEXPITV) but all user profiles set to *NOMAX, meaning that the user’s password never expires and, therefore, never has to be changed. More frequently, I see administrators set their own profiles to have a non-expiring password. The only profiles that should have a non-expiring password are those that are considered a “service account”—that is, a profile that is used to make connections to the system and for which a regularly expiring password could cause significant disruption in the business process associated with the profile.

Note that I have mentioned nothing about the User class attribute of the user profile. I see way too many auditors focus on this attribute when it is absolutely meaningless as an indicator of a user’s capability. It is never used by the system to check authority—in other words, it is never used to determine if a user can access an object or perform a task. User class is a way for administrators to initially configure which special authorities the user is granted, but after that, it is virtually meaningless. If you are looking at the user class attribute and assuming that because all profiles are set to *USER they have no special authorities, you couldn’t be more wrong. Even as the profile is created, you can set the user class to *USER and grant the profile all special authorities, including *ALLOBJ. Conversely, I could create a profile in the *SECOFR user class and grant them no special authorities. Stop looking at the User class! Forget about User class and examine the special authority attributes to ensure you have an accurate picture of users’ capabilities.

While there are other attributes of the user profile that you may want to examine (except for User class!), the ones I’ve described here are the primary attributes that define users’ capabilities.

Authority to Data

While most auditors do a great job of evaluating user profile capabilities, I’ve seen very few correctly assess access to data. I understand that it depends on the scope of the audit as to what database files need to be examined. But if you need to evaluate who has access to specific data—whether it’s financial, healthcare, PCI, or PII—you need to look beyond the application settings—that is, beyond the menu options users have been granted. To accurately evaluate who has access to the data, you must look at the object authorities and ownership of the database(s). Many administrators will tell you that “users only have access to data via the menu options provided to them.” And there is some truth to that statement. It’s true in the context of when the user accesses the application interfaces—for example, through a green-screen menu or via a browser interface. But unless a deny by default access control setting has been implemented, users can gain access through other interfaces outside of the application interfaces using protocols such as ODBC, FTP, or SSH, for example, or users with command line access (those configured as limited *NO or *PARTIAL) can read or modify the file through any number of vendor- or system-supplied commands.

To fully assess users’ access to data, you must look at the *PUBLIC authority setting, the list of any private authorities granted as well as the primary group if one has been assigned, along with the users and groups authorized to the authorization list if the object is secured by one. In addition, you must look at the object’s owner. If the owner is a group profile, every member owns that file—in other words, has *ALL authority to the file. If all application users are a member of that group, then all application users have *ALL authority to all data in the application; they are not simply only authorized to the menu options assigned. They have full authority to the entire application! And, unfortunately, this is the way many application vendors configure their applications—that is, they require application users to be a member of the profile that owns the application. In addition, as the system ships, the default *PUBLIC authority when an object is created is *CHANGE. So, unless changed, database files by default are created with a default access control setting (*CHANGE) that allows the files to be read or modified by any profile on the system. It goes without saying that this scenario poses a significant risk to the confidentiality and integrity of the data.

Summary

While not a comprehensive list of all areas that need to be audited, I hope that you’ve found this discussion of the most critical to be useful. I’m passionate about the need to adequately and correctly audit this system because it contains many organizations’ valuable data. If this helps one of you perform a more thorough or accurate audit of the system, then I’ve done my job.

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: