I recently spoke with a number of IT professionals who were facing regulatory mandates including PCI, Sarbanes-Oxley, and HIPAA. For these organizations, tremendous resources are often consumed in order to generate the variety of information deemed necessary to prove compliance. Other session attendees indicated that, despite having no formal regulatory requirement, they wanted to learn more about security reporting on IBM i.
My suggestion was to start by using the GO SECTOOLS menu to run some critical reports. Beneficial information available via this menu includes profiles with default passwords and job descriptions with named users. In addition, I suggest printing and reviewing user profiles using the PRTUSRPRF command, and system values via the DSPSYSVAL command. This should be done for all partitions. Then a process should be defined to compare the current systems against an accepted baseline. Reports should then be archived for later retrieval if necessary. Unfortunately, it doesn’t take long to realize that this can quickly become a burdensome task, exacerbated by the current trend towards virtualized workloads deployed across numerous partitions. When you include reporting of the security event data that IBM i is able to record, many organizations turn to the audit experts at HelpSystems to help streamline the entire audit lifecycle process.
Compliance Monitor for IBM i effectively eliminates the burden of configuration and event reporting. Hundreds of report options provide visibility to static configuration elements, including user profiles and system values, as well as all 70+ event types that can be recorded into the security audit journal, QAUDJRN. Batch scheduling and distribution features eliminate the traditional burden of running, gathering, and disseminating the information to the interested parties. Global organizations can report against every instance of the operating environment—regardless of whether they run on numerous servers and partitions—as quickly and efficiently as an organization with a single partition system.
Recent enhancements in browser technology have eliminated the requirement for client software, further simplifying the highly-efficient infrastructure. After installation of the host component, authorized users simply point their browser at a URL and sign in to select which systems to interrogate and which reports are desired. Even this simple step can be eliminated by initiating the desired reports using any IBM scheduler (there’s also a scheduler built in to the software along with integration with Robot Schedule) and selecting to distribute the results via e-mail as shown in figure 1.
If SECTOOLS falls short of the flexibility, scalability, and automation that your organization demands, Compliance Monitor for IBM i is the missing link—with features that include:
- Consolidated reporting against many partitions
- Centralized storage of audit journal data, with upwards of 90% compression
- Scorecard reports for executive summary of the state of compliance
- Scheduling and distribution of reports via e-mail
One of the most powerful features of Compliance Monitor for IBM i can be found within its baseline comparison. System value policies can be defined and used to rapidly determine regulatory and policy non-compliance. Filters can sequester compliant values, focusing attention exclusively on issues regardless of the number of servers or partitions that are included in the report.
Once reports have been run, Compliance Monitor for IBM i also helps with the interpretation of the findings. An integrated compliance guide provides explanations and best-practice recommendations. Alignment and mapping to common regulatory frameworks, such as COBiT and ISO, help the audit and I.T. community converse using a common language.
Compliance Monitor for IBM i is a game-changer for organizations wishing to perform compliance or forensic reporting. Even those without formal regulatory mandates will benefit from the increased awareness of server configuration—an awareness that inevitably results in better security. Automating this important but time-consuming business function alleviates the need to manually generate, extract, consolidate, and disseminate security reports so that you can spend more time with your family this holiday season.