Let's Get Started with IBM i Security

Your all-access pass to the Getting Started with IBM i Security Series

Text

Congratulations on taking a big step toward securing your IBM i systems! The 2020 State of IBM i Security Study recently confirmed fears surrounding the risks associated with poor configuration, revealing that most Power Systems lack adequate security controls and auditing measures.

In this fast-paced series, leading experts share insight into critical areas of IBM i security.

There’s a lot of great information here! You may want to bookmark this page so you can return later to watch the recordings as time allows.

1. Getting Started with IBM i Security: System Values

Set the tone for data protection with security-relevant system values

 

The series opens with an introduction to security-relevant system values, which are one of the fundamental elements of IBM i security. The security system values enable you to set the tone of security on your IBM i, enforce password composition rules, and enable auditing. Watch this on-demand webinar to learn about these system values and provide guidance on best practice settings.

Back to top >

 
 

2. Getting Started with IBM i Security: Event Auditing

Learn why event auditing is necessary and how to configure it

 

In this second session, Robin Tatam covers the basics of event auditing, including why auditing is necessary, how to determine if IBM i auditing is currently active, how to configure auditing with one simple command, what audit events are recorded (and which are missed), and how high availability (HA) applications often make critical events disappear, as well as event reporting and real-time alerting.

Back to top >

3. Getting Started with IBM i Security: PC Access

Protect your system from unauthorized network access through readily available PC tools

 

In this third session, you’ll find out how to secure network access through PCs. Robin Tatam explains what exit programs are and how you can use them to protect your organization. You’ll also learn how well-known services like FTP and ODBC enable users to access sensitive data without oversight or restrictions.

Back to top >

 
 

4. Getting Started with IBM i Security: User Privileges

Get up to speed on special authorities, command line access, and auditing user activities

 

In this fourth session, Robin Tatam shows how you can limit user access without letting productivity take a hit. He provides a thorough investigation of user privileges, including what makes a privileged user, everything you need to know about special authorities, command line access, turning users into administrators, how to audit user activities, and how to use role-based access controls (RBAC) on IBM i.

Back to top >

5. Getting Started with IBM i Security: Integrated File System (IFS)

Discover one of the most commonly overlooked aspects of IBM i security: the IFS

 

In this fifth session, Sandi Moore defines the integrated files system and shows how the IFS is configured, how you can avoid the most common IFS security mistakes, and how to track user activity. You’ll also learn what viruses can do—and have done!—to IBM i through the IFS and what you can do to prevent them.

Back to top >

 
 

6. Getting Started with IBM i Security: Object Authority

Learn best practices for controlling access to data and programs

 

The series closes with an in-depth look at object authority and public authority, a unique concept on IBM i. You'll learn how they work and why default authority values constitute a security gap.

Back to top >

The Easiest Way to Evaluate Your IBM i Security Risks

Security is a major concern in many industries, but IBM i professionals often don’t know where to begin. That’s why a Security Scan is the perfect place to start identifying risk areas on your system and creating a strategy to correct them. Security Scan is a free service that uses a secure, non-intrusive tool to audit common security metrics, followed by an analysis of the results by an IBM i security expert.

GET MY FREE SECURITY SCAN