Download "Security Auditing In The Real World" Guide

An overview of auditing events on Power Systems running IBM i

Text

Power Systems™ running IBM i are used by some of the largest and most secure organizations on the planet. They rely on security functionality supplied by IBM and third-party providers, such as Powertech, to comply with government legislation and industry regulations.

As part of compliance, it’s critical that security officers and auditors have insight into the activities of application and system users. They often must conduct forensic analysis of user activities and system events in a timely and efficient manner. IBM includes powerful auditing functionality in the operating system for this purpose.

With planning, auditing security events on your Power Systems running IBM i is both achievable and manageable. This white paper describes how you can take a reasonable, real-world approach to security auditing.