Difference between revisions of "Security Basics"
From MidrangeWiki
(→Milt Habek of UPI) |
|||
Line 1: | Line 1: | ||
[[Category:Security]] | [[Category:Security]] | ||
See [[General Computer Security]] for info and links about Security outside of the 400. | See [[General Computer Security]] for info and links about Security outside of the 400. | ||
− | + | == Security Commands == | |
+ | === User Profile === | ||
+ | === Password === | ||
+ | === Object Authority === | ||
+ | === Objects Owned === | ||
+ | === Authorization List === | ||
+ | === Adopted Authority === | ||
+ | * [[DSPGMADP]] Display Program Adopt | ||
+ | ** Specify a user profile and get a list of the programs that adopt that user's authority. | ||
== Security 400 Professionals == | == Security 400 Professionals == | ||
Revision as of 18:09, 24 June 2005
See General Computer Security for info and links about Security outside of the 400.
Contents
Security Commands
User Profile
Password
Object Authority
Objects Owned
Authorization List
Adopted Authority
- DSPGMADP Display Program Adopt
- Specify a user profile and get a list of the programs that adopt that user's authority.
Security 400 Professionals
Wayne Evans
- Wayne O. Evans http://www.woevans.com/ is a former IBM 400 Security Architecture specialist http://woevans.freeyellow.com/WOEBIO.html who now has his own 400 Security Consulting firm
- He designed many of the security features of the 400 and its predecssor machines, also many 400 features in addition to security
- He advises us to get a more secure web browser than Microsoft IE
- He does 400 Security columns and seminars
- He has a book out with a collection of his 400 Security articles
- OS/400 Security Education and Training
- Security/400 FAQ
http://woevans.freeyellow.com/Qst_Ans.pdf
- Biggest threats to overall 400 security
- Best Practices
- What can be done at the Sign On Screen
- How secure are 400 passwords
- Why security level 40
- Security 400 auditing
- Client Access
- Operations Navigator
- Exit Programs
- Authorization Lists
- ODBC
- Encryption 400
- How evaluate security software vendors
- VPN interesting factoid
- The use of VPN (Virtual Private Network) causes all traffic over the VPN to be encrypted.
- Al Mac notes that this may not help if Spyware gets onto the PC of the person using VPN to access the 400
- and lots more
- Other downloads available http://www.woevans.com/My_Homepage_Files/Page3.html such as
- step by step instructions to improve your 400 Security
- sample Security Policy
- Security related software
- History of 400 and predecessor machines
- Other downloads available http://www.woevans.com/My_Homepage_Files/Page3.html such as
- OS/400 Security Review Audit
- OS/400 Security Training
- NetQ PentaSafe Training
- His links to Security 400 user groups, discussion forums, and related info http://www.woevans.com/My_Homepage_Files/Page1.html
- 400 user groups in gneral http://www.woevans.com/usergroups.html
Milt Habek of UPI
Milt is CEO of Unbeaten Path International UPI http://www.unbeatenpathintl.com/ which markets many security solutions for the 400, and stuff for ERP such as BPCS.
- IT Security Assurance Navigation http://www.unbeatenpathintl.com/ITsecure/source/1.html Has articles on
- why we need better security
- gov regulation and compliance needs
- Sarbanes Oxley SOX Info
- Security Compliance Products from UPI http://www.unbeatenpathintl.com/compliancecatalog/source/1.html
- Bill of Health http://www.unbeatenpathintl.com/BOH/source/1.html
- This software examines the security of your 400 and provides a report listing what needs to be fixed. Then after you have resolved some issues, run it again. Use this to document to auditors that you making progress with your 400 security remediation.
- BPCS Security Enhancements http://www.unbeatenpathintl.com/SOXstuffers/source/1.html
- Auditor's Handbook http://www.unbeatenpathintl.com/audhand.html
- Most ERP users have assumptions about how their software works, that can be unfounded, leading to a pattern of human error and misconceptions. This manual addresses BPCS gotchas and such areas of common miconceptions to help an Audotr who may not be a BPCS expert see where to look to see if any given customer site has the kinds of errors typical to many BPCS sites.
- Batten Down the Hatches http://www.unbeatenpathintl.com/battendown/source/1.html
- [[BPCS}} has been around for a while, with many versions out there, whose security was Ok when they first came out, but as the computer security threat world has evolved, we have growing needs to alter how package security functions.
- SSA has step by step instructions how to fix BPCS security, which can be a major ordeal to implement
- or we can buy the UPI rapid implementation solution
- By Invitation Only http://www.unbeatenpathintl.com/BIOnly-start/source/1.html
- BPCS Security can be a pain in the neck to manage. This product simplifies the task, and rapidly produces management-friendly reports.
- Locksmith Archiving http://www.unbeatenpathintl.com/locksmith_bpcs/source/1.html
- As we get more and more data, there can be performance problems, leading some sites to want to upgrade 400 to a faster box, in which the biggest expense can be a new CPU key from SSA.
- A much more economical solution is to archive from the BPCS files the oldest data, so it is still available if needed, but not a drag on performance when acceessing the most recent data
- Many other BPCS enhancements to be written up in some section other than Security area
- Auditor's Handbook http://www.unbeatenpathintl.com/audhand.html
- No Seams for HIPPA electronic security http://www.unbeatenpathintl.com/HIPAAstart/source/1.html
- NO Seams for UCCNet Integrity from LANSA http://www.unbeatenpathintl.com/UCCnet-directapp.htm
- Stitch in Time http://www.unbeatenpathintl.com/award/source/1.html
- This monitors who messed with critical data when doing what ... you decide which files and fields need monitoring
- Tight as a Drum http://www.unbeatenpathintl.com/tightasadrum/source/1.html
- This addresses software change management
- Bill of Health http://www.unbeatenpathintl.com/BOH/source/1.html
Sky View
One of the founders of Skyview is Carol Woodbury, who is also one of the mothers of IBM 400 Security architecture, former Chief Security Architect for OS/400 for IBM and one of the leading authorities on OS/400 security.
http://www.skyviewpartners.com/java-skyviewp/index.jsp
Skyview offers 400 Security and General Computer Security info
- education
- assessment
- security tools
- remediation services
- compliance info about gov regulations
- white papers