Expert Tips for Securing AIX Systems: Beyond the Basics

On-Demand Webinar

Expert Tips for Securing AIX Systems: Beyond the Basics

AIX
Recorded:
February 13, 2018

 

Servers running AIX are frequent targets of cyberattacks, according to the Data Breach Investigations Report. From DDoS to malware, attackers have many strategies at their disposal—and common cybersecurity mistakes makes attacking your infrastructure easier.

One of the most serious mistakes is failing to create and implement a well-defined security policy. Many compliance mandates like Sarbanes-Oxley (SOX) and HIPAA require your organization to have such a policy in place.

A written plan of how your organization intends to protect its IT assets is the most effective way to address security issues created by new technologies like mobile devices and cloud enablement. Without such a policy, it’s very difficult to ensure you have appropriate controls in place to protect mission-critical data.

But how do you even begin creating and implementing an AIX security policy if you’re not an expert on AIX security?

Watch this session—the second in our series on creating and using AIX security policies, presented by cybersecurity expert Bob Erdman. Bob explains which issues to consider beyond controlling user access, including:

  • Identifying and securing your network interfaces
  • Configuring secure remote access methods
  • How to remove system services you don’t need to limit your attack surface
  • Securing the system services that you do need to perform your business functions
  • Yes, you do need anti-virus protection
  • How to initially assess and then continuously monitor your AIX system’s security settings

 

Check Your AIX Security Configuration

Misconfigured settings leave data vulnerable. Find out how your systems compare to security best practices with a free Security Scan.