IBM i (AS/400) Security Best Practice: Recommended Response to Invalid Sign-On Attempts
Passwords are forgotten, mistyped, or simply mixed up with other passwords. Invalid sign-on attempts happen to everyone from time to time, and IBM i users are no different. Help desk personnel charged with resetting these passwords often work with the same users over and over. How do you track which users have multiple invalid sign-on attempts? What if your powerful profiles are targeted?
The annual State of IBM i Security Study analyzes how organizations around this critical security issue. Keep reading for the latest data and to learn IBM i (AS/400) security best practices around invalid sign-on attempts.
Do invalid sign-on attempts really indicate a problem?
Larger numbers of invalid attempts could indicate an intrusion attempt, while three, five, or even ten attempts are probably the sign of a frustrated user.
It’s also possible that attempts numbering in the thousands or even hundreds of thousands are the sign of a broken application, perhaps one lacking a built-in mechanism to recognize when its attempts to connect to the server are being denied. But that assumption should never be made without investigation. And a broken application is still an application that is not fulfilling the business purpose for which it was written.
The level of risk increases significantly if the offending profile is determined to be, for example, QSECOFR, and is not disabled automatically, or if the security team has no way to be notified of failed access attempts in a timely manner.
IBM i (AS/400) security best practices for invalid sign-on attempts
Timely notification and investigation of an unusually large number of denied access attempts is a critical first phase in the detection of a possible compromise.
Too often, data breaches hit the headlines accompanied by a startling revelation over just how long the breach was permitted to occur. An organization cannot stop a breach if they don’t know it’s happening, and invalid sign-on attempts are one of the most obvious indicators.
To protect your system, make sure profiles are disabled by default after the maximum allowed sign-on attempts is exceeded.
A tool for self-service password resets can help the users who have truly forgotten their passwords. Password Self Help is one option that makes it easy for IBM i users reset a password and it sends instant alerts to designated personnel when unsuccessful resets occur. This allows administrators to take corrective action before any damage is done.
A multi-factor authentication solution can also protect your systems by requiring another credential in addition to a password. Powertech Multi-Factor Authentication is one such option that can help protect servers inside and outside the firewall, as required by PCI DSS.
Find out how organizations around the world are securing their systems and learn IBM i (AS/400) security best practices. Download the latest State of IBM i Security Study today.