White Paper

The Essential Layers of IBM i Security

The increased frequency of high-profile breaches and the corresponding rise of new and expanded regulatory compliance requirements is putting enormous pressure on IT departments to assure their corporate executives that business-critical systems and data are secure. One particular statistic from a recently conducted Precisely survey of IT professionals is revealing in that 69% of respondents said they were only “somewhat confident” (or worse) in the effectiveness of their company’s IT security program. Given today’s rapidly evolving security threats, even being “somewhat confident” doesn’t cut it when it comes to IBM i security.

Improving confidence in one’s IT security posture requires a solid understanding of all potential vulnerabilities as well as the most effective best practices and technologies in order to minimize the possibility of a breach. To help, Precisely has created this white paper as a roadmap, grouping together important security best practices and technologies into six primary categories or “layers.” These layers cover physical devices, networks, configuration of the IBM i OS, access to systems, protection of data at the file and field level, and monitoring and auditing of systems. The reason it’s particularly helpful to view these security categories as “layers” is that, to some extent, each category overlaps with the others to provide multiple lines of defense. In other words, should one security layer be somehow compromised, there’s a good chance that another layer will thwart a would-be intruder.

6 layers of IBM i Security

  1. Physical Security – Control access to computer rooms and data centers; ensure computing equipment and peripherals cannot be tampered with; secure end points suspicious activity is detected; log all security-related events for the purposes of tracking and documentation
  2. Network Security – Implement intrusion prevention and detection technologies; group and protect related resources within network segments;encrypt network traffic
  3. IBM i Security Configuration – Properly configure necessary security settings within the IBM iOS; keep the OS and PTFs up to date; closely manage user profiles
  4. System-Access Security – Keep unauthorized users out of your IBM i; maintain tight control over what authorized users are able to do once logged in
  5. File and Field Security – Ensure sensitive data cannot be seen by unauthorized individuals, whether internal or external
  6. Security Monitoring and Auditing – Automatically alert administrators and security officers whenever suspicious activity is detected; log all security-related events for the purposes of tracking and documentation

Download this white paper to learn more about the six layers of IBM i security and how Precisely can help you build and optimize your own layers with our best-in-class security software solutions.

The Essential Layers of IBM i Security
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.