Layers of Security
Physical Security
Amy O’Connor – Chief Data and Information Officer
Bill Hammond – Sr, Product Marketing Manager
Today’s Agenda
• Layers of Security Overview
• Physical Security
• Servers and Storage Devices
• Network Devices
• Peripheral Devices
• End-point Devices
• Q & A
2
Layers of Security
3
Physical Security
More than just controlling
access to computer rooms
and data centers, a thorough
physical security plan
requires, among other things,
that computing equipment be
protected from theft, misuse,
and intentional or accidental
tampering.
4
Physical Security
1
Servers and
storage devices
2
Network devices
3
Peripheral devices
4
End-point devices
5
Servers and
storage devices
Servers and Storage Devices
7
• Lock into place all servers and storage devices
• Lock front-panel covers to prevent intentional or accidental
changes
• Secure power and other cabling to prevent easy
disconnection
• Strong authentication and access protocols
• Data protection – backups, HA, DR
• Physical environment - HVAC
Network
devices
Network Devices
9
• Lock into place physical firewalls, routers, switches, and other
network devices
• Ensure power and other cabling can’t be easily disconnected
• Watch for unauthorized configuration changes to network
equipment
• Monitor for covert installation of “sniffing” equipment
• Use proper encryption for wireless networks (WPA, WPA2,
etc.).
• Virtual Private Networks (VPN)
Peripheral
devices
Peripheral Devices
11
• Keep all printers and fax machines that output sensitive
information within secured areas
• Don’t forget your VOIP phone system
• Ensure employees who do have access to this output are
properly trained in how to prevent it from being seen by
unauthorized personnel
• Regulations such as HIPAA, GDPR, and others require that
sensitive information be secured not only within databases
but also when it appears on printed output.
End-point
devices
End-point Devices
13
• Employee education on safe use of desktops, laptops, and
mobile devices
• Education needs to include taking care that these devices
aren’t lost or stolen.
• IT staff needs the ability to locally or remotely execute a
secure-wipe process
• Stolen
• Lost
• Re-purposed
• Devices need to be kept up to date
• Anti-virus
• Anti-malware
• Anti-ransomware
Top Takeaways
• Multiple layers overlap and provide
additional protection
• Ensure that all your physical devices have a
digital stream that you can monitor
• Physical security is constantly changing –
new threats, new solutions
• Network devices must be secured as much
as servers
14
Layers of Security
15
Download the White Paper
The six layers of IBM i security and how
Precisely can help
16
https://www.precisely.com/resource-center/whitepapers/the-essential-
layers-of-ibm-i-security
Layers of Security Webinar Series
17
July 15, 2020 July 29, 2020 August 12, 2020 August 26, 2020 September 9, 2020 September 23, 2020
Q & A
Essential Layers of IBM i Security: Physical Security

More Related Content

PDF
Lect 07 computer security and privacy 1 4 q
PDF
Proprietary Information
PPT
Data Center Security: Always a Main Concern for Businesses
PPTX
Hardware Security
PPTX
Essential Layers of IBM i Security Series – Network Security
PPT
Intrusion Systems
PPTX
Hardware Security
ODP
Jupiter physical security ppt 2016 1
Lect 07 computer security and privacy 1 4 q
Proprietary Information
Data Center Security: Always a Main Concern for Businesses
Hardware Security
Essential Layers of IBM i Security Series – Network Security
Intrusion Systems
Hardware Security
Jupiter physical security ppt 2016 1

What's hot (20)

PDF
Data Center Security
PPTX
Data/File Security & Control
PPT
22 need-for-security
PPTX
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
PPTX
Information security challenges in today’s banking environment
PPTX
Physical access control
PPTX
security and ethical challenges in information systems
PPT
Information Assurance And Security - Chapter 2 - Lesson 2
PDF
Tips on Trade Secrets
PPT
Development of security architecture
PPT
Commercial And Government Cyberwarfare
PPT
Harshit security
PPTX
Computer security concepts
PPT
PPTX
Log maintenance network securiy
PDF
[CLASS 2014] Palestra Técnica - Oliver Narr
DOCX
Hardwar based Security of Systems
PPT
Information security and other issues
PPTX
Chapter 1
PDF
Information systems security(1)
Data Center Security
Data/File Security & Control
22 need-for-security
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
Information security challenges in today’s banking environment
Physical access control
security and ethical challenges in information systems
Information Assurance And Security - Chapter 2 - Lesson 2
Tips on Trade Secrets
Development of security architecture
Commercial And Government Cyberwarfare
Harshit security
Computer security concepts
Log maintenance network securiy
[CLASS 2014] Palestra Técnica - Oliver Narr
Hardwar based Security of Systems
Information security and other issues
Chapter 1
Information systems security(1)
Ad

Similar to Essential Layers of IBM i Security: Physical Security (20)

PPT
Sanctuary Device Control
PDF
Enterprise Edge Security with Cisco ISE
PDF
Optimizing The Healthcare Stack for Performance_Protected Harbor eBook
PPTX
Network Security ppt
PPTX
Unit 3 - SECURITY CONSIDERATIONS FOR WIRELESS DEVICES.pptx
DOCX
Infrastructure SecurityChapter 10Principles of Compute.docx
DOCX
A network security policy group project unit 4 (1) july 2015
PDF
Print - Overlooked piece of the security puzzle whitepaper - DRAFT
PPTX
security in is.pptx
PPT
Spotlight on GFI EndPoint Security 2013
PPTX
Types of Security in Industrial Security
PPTX
How US Cybersecurity Executive Order Impacts IBM i Customers
PPTX
Ch 04 wireless security
PDF
Paper Florencio Cano - Patient data security in a wireless and mobile world
KEY
Mis
PPTX
Secure physical infrastructure
PPTX
Sequrity policy
PPTX
CyberSecurity Assignment.pptx
DOCX
Network Diagram of a company ABCD Roshan basnet it 29
PPS
Physical security.ppt
Sanctuary Device Control
Enterprise Edge Security with Cisco ISE
Optimizing The Healthcare Stack for Performance_Protected Harbor eBook
Network Security ppt
Unit 3 - SECURITY CONSIDERATIONS FOR WIRELESS DEVICES.pptx
Infrastructure SecurityChapter 10Principles of Compute.docx
A network security policy group project unit 4 (1) july 2015
Print - Overlooked piece of the security puzzle whitepaper - DRAFT
security in is.pptx
Spotlight on GFI EndPoint Security 2013
Types of Security in Industrial Security
How US Cybersecurity Executive Order Impacts IBM i Customers
Ch 04 wireless security
Paper Florencio Cano - Patient data security in a wireless and mobile world
Mis
Secure physical infrastructure
Sequrity policy
CyberSecurity Assignment.pptx
Network Diagram of a company ABCD Roshan basnet it 29
Physical security.ppt
Ad

More from Precisely (20)

PDF
Modernizing Power Systems: Cloud Migration Strategies for IBM I and AIX with ...
PDF
What Every Data Leader Should Know About Third-Party Data for AI and Analytic...
PDF
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
PDF
Unlock new opportunities with location data.pdf
PDF
Reimagining Insurance: Connected Data for Confident Decisions.pdf
PDF
Introducing Syncsort™ Storage Management.pdf
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
PDF
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
PDF
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
PDF
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
PDF
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
PDF
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
PDF
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
PDF
The 2025 Guide on What's Next for Automation.pdf
PDF
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
PDF
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
PDF
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
PDF
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
Modernizing Power Systems: Cloud Migration Strategies for IBM I and AIX with ...
What Every Data Leader Should Know About Third-Party Data for AI and Analytic...
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
Unlock new opportunities with location data.pdf
Reimagining Insurance: Connected Data for Confident Decisions.pdf
Introducing Syncsort™ Storage Management.pdf
Enable Enterprise-Ready Security on IBM i Systems.pdf
A Day in the Life of Location Data - Turning Where into How.pdf
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
The 2025 Guide on What's Next for Automation.pdf
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...

Recently uploaded (20)

PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPT
Geologic Time for studying geology for geologist
PDF
Getting Started with Data Integration: FME Form 101
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
Modernising the Digital Integration Hub
PDF
Architecture types and enterprise applications.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
DOCX
search engine optimization ppt fir known well about this
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Five Habits of High-Impact Board Members
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Benefits of Physical activity for teenagers.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Zenith AI: Advanced Artificial Intelligence
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
WOOl fibre morphology and structure.pdf for textiles
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Developing a website for English-speaking practice to English as a foreign la...
A comparative study of natural language inference in Swahili using monolingua...
Geologic Time for studying geology for geologist
Getting Started with Data Integration: FME Form 101
A novel scalable deep ensemble learning framework for big data classification...
Modernising the Digital Integration Hub
Architecture types and enterprise applications.pdf
Assigned Numbers - 2025 - Bluetooth® Document
search engine optimization ppt fir known well about this
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Five Habits of High-Impact Board Members
DP Operators-handbook-extract for the Mautical Institute
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf

Essential Layers of IBM i Security: Physical Security

  • 1. Layers of Security Physical Security Amy O’Connor – Chief Data and Information Officer Bill Hammond – Sr, Product Marketing Manager
  • 2. Today’s Agenda • Layers of Security Overview • Physical Security • Servers and Storage Devices • Network Devices • Peripheral Devices • End-point Devices • Q & A 2
  • 4. Physical Security More than just controlling access to computer rooms and data centers, a thorough physical security plan requires, among other things, that computing equipment be protected from theft, misuse, and intentional or accidental tampering. 4
  • 5. Physical Security 1 Servers and storage devices 2 Network devices 3 Peripheral devices 4 End-point devices 5
  • 7. Servers and Storage Devices 7 • Lock into place all servers and storage devices • Lock front-panel covers to prevent intentional or accidental changes • Secure power and other cabling to prevent easy disconnection • Strong authentication and access protocols • Data protection – backups, HA, DR • Physical environment - HVAC
  • 9. Network Devices 9 • Lock into place physical firewalls, routers, switches, and other network devices • Ensure power and other cabling can’t be easily disconnected • Watch for unauthorized configuration changes to network equipment • Monitor for covert installation of “sniffing” equipment • Use proper encryption for wireless networks (WPA, WPA2, etc.). • Virtual Private Networks (VPN)
  • 11. Peripheral Devices 11 • Keep all printers and fax machines that output sensitive information within secured areas • Don’t forget your VOIP phone system • Ensure employees who do have access to this output are properly trained in how to prevent it from being seen by unauthorized personnel • Regulations such as HIPAA, GDPR, and others require that sensitive information be secured not only within databases but also when it appears on printed output.
  • 13. End-point Devices 13 • Employee education on safe use of desktops, laptops, and mobile devices • Education needs to include taking care that these devices aren’t lost or stolen. • IT staff needs the ability to locally or remotely execute a secure-wipe process • Stolen • Lost • Re-purposed • Devices need to be kept up to date • Anti-virus • Anti-malware • Anti-ransomware
  • 14. Top Takeaways • Multiple layers overlap and provide additional protection • Ensure that all your physical devices have a digital stream that you can monitor • Physical security is constantly changing – new threats, new solutions • Network devices must be secured as much as servers 14
  • 16. Download the White Paper The six layers of IBM i security and how Precisely can help 16 https://www.precisely.com/resource-center/whitepapers/the-essential- layers-of-ibm-i-security
  • 17. Layers of Security Webinar Series 17 July 15, 2020 July 29, 2020 August 12, 2020 August 26, 2020 September 9, 2020 September 23, 2020
  • 18. Q & A

Editor's Notes

  • #3: Amy: You need to use data to secure your data
  • #4: The increased frequency of high-profile breaches and the corresponding rise of new and expanded regulatory compliance requirements is putting enormous pressure on IT departments to assure their corporate executives that business-critical systems and data are secure. One particular statistic from a recently conducted Precisely survey of IT professionals is revealing in that 69% of respondents said they were only “somewhat confident” (or worse) in the effectiveness of their company’s IT security program. Given today’s rapidly evolving security threats, even being “somewhat confident” doesn’t cut it. Improving confidence in one’s IT security posture requires a solid understanding of all potential vulnerabilities as well as the most effective best practices and technologies in order to minimize the possibility of a breach. To help, Precisely has created this white paper as a roadmap, grouping together important security best practices and technologies into six primary categories or “layers.” These layers cover physical devices, networks, configuration of the IBM i OS, access to systems, protection of data at the file and field level, and monitoring and auditing of systems. The reason it’s particularly helpful to view these security categories as “layers” is that, to some extent, each category overlaps with the others to provide multiple lines of defense. In other words, should one security layer be somehow compromised, there’s a good chance that another layer will thwart a would-be intruder. The six layers of IBM i security are summarized in the following diagram and are detailed in the remainder of this white paper
  • #5: Amy: There are changes in the IT environment that are impacting Physical Security IoT Cloud Drones Mobility
  • #6: Amy: How has Covid impacted these elements
  • #14: Amy: Minimize data – USB devices
  • #16: The increased frequency of high-profile breaches and the corresponding rise of new and expanded regulatory compliance requirements is putting enormous pressure on IT departments to assure their corporate executives that business-critical systems and data are secure. One particular statistic from a recently conducted Precisely survey of IT professionals is revealing in that 69% of respondents said they were only “somewhat confident” (or worse) in the effectiveness of their company’s IT security program. Given today’s rapidly evolving security threats, even being “somewhat confident” doesn’t cut it. Improving confidence in one’s IT security posture requires a solid understanding of all potential vulnerabilities as well as the most effective best practices and technologies in order to minimize the possibility of a breach. To help, Precisely has created this white paper as a roadmap, grouping together important security best practices and technologies into six primary categories or “layers.” These layers cover physical devices, networks, configuration of the IBM i OS, access to systems, protection of data at the file and field level, and monitoring and auditing of systems. The reason it’s particularly helpful to view these security categories as “layers” is that, to some extent, each category overlaps with the others to provide multiple lines of defense. In other words, should one security layer be somehow compromised, there’s a good chance that another layer will thwart a would-be intruder. The six layers of IBM i security are summarized in the following diagram and are detailed in the remainder of this white paper