SlideShare a Scribd company logo
All trademarks and registered trademarks are the property of their respective owners.© HelpSystems LLC. All rights reserved.
Getting Started With
IBM i Security:
IFS Security
HelpSystems Corporate Overview. All rights reserved.
ROBIN TATAM, CBCA CISM
Director of Security Technologies
952-563-2768
robin.tatam@helpsystems.com
Your Speaker
HelpSystems Corporate Overview. All rights reserved.
• Premier Security Products (globally-recognized “PowerTech” brand)
– Represented by industry veteran, Robin Tatam, CISM
• Comprehensive IBM i Security Services
– Represented by industry veteran, Carol Woodbury, CRISC
• Member of PCI Security Standards Council
• Authorized by NASBA to issue CPE Credits for Security Education
• Publisher of the Annual “State of IBM i Security” Report
About HelpSystems’ Security Investment
HelpSystems Corporate Overview. All rights reserved.
What Is The Mysterious IFS?
HelpSystems Corporate Overview. All rights reserved.
Independent Front
Suspension
Indian Fertility Society
Initial Flight Screening
Initiative on Financial
Security
Institute for Fiscal Studies
Insurance and Financial
Services
Intensive Freshman Seminar
International Financial
Statistics
International Food Standard
Integrated Forecast System
According to Wikipedia, it can be many
things to many people:
What Is The Mysterious IFS?
HelpSystems Corporate Overview. All rights reserved.
Integrated File System
Integrated File System - on IBM midrange & mainframe
systems (e.g. OS/400, MVS, VM/CMS), the POSIX
compatible file system provided by the operating system, as
opposed to the traditional non-POSIX file system it also
supplies.
What Is The Mysterious IFS?
HelpSystems Corporate Overview. All rights reserved.
• Added to OS/400 in V3R1 in 1994
• Integrates IBM i with UNIX, Windows, and others
• Directory structure much like a PC
• Provides access to data stored on integrated servers,
or on other remote IBM i servers
• Contains several pre-defined file systems:
– All contained within a single root directory
– Each with their own limitations and rules
What Is The Mysterious IFS?
HelpSystems Corporate Overview. All rights reserved.
Contrary to popular belief, it was not an add-on to
the existing file structures, but rather encompasses
ALL of the file structures. This includes those that
pre-date the IFS such as:
Native Libraries QSYS.LIB
Documents and Folders QDLS
What Is The Mysterious IFS?
HelpSystems Corporate Overview. All rights reserved.
We ALL technically use the IFS as it encompasses
QSYS.LIB
Some other common uses of the IFS include:
• Integrated PC servers (Intel processor)
• NetServer (Explorer access to the IFS)
• CD images for unattended installation
• PASE environment for UNIX applications
• IBM i Access (Client Access) & Navigator executables
• Apache HTTP server
• Tomcat application server
• WebSphere application server
• Lotus Domino
• Digital Certificate Manager
“I’m Not Even Using The ISF, I mean IFS!”
HelpSystems Corporate Overview. All rights reserved.
IBM i ships with its public access default to the
IFS set to:
Native objects = *CHANGE
IFS root folder = *RWX
plus all object authorities
(aka *ALL)
TIP: This should be changed ASAP!
It’s Already Secure, Right?!”
HelpSystems Corporate Overview. All rights reserved.
Organizations often place
tremendous trust in the
people accessing their
servers.
Authorized users usually
have privileges far in
excess of any business
requirement.
“But Bill Has Worked Here for xx Years!” (insert big number)
HelpSystems Corporate Overview. All rights reserved.
According to the “State of
IBM i Security Study,” most
organizations still base their
security on lack of user
knowledge or malicious intent.
• Average of 147 users with
*ALLOBJ special authority
• Average of 76 enabled profiles
with default passwords
“But Bill Has Worked Here for xx Years!” (insert big number)
HelpSystems Corporate Overview. All rights reserved.
Lots of people have skeletons in
their closet!
The cold reality of an economic
downturn may cause (normally)
trustworthy users to act out of
desperation.
And there are vices like gambling
and drugs that often influence
ethics.
And, of course, anyone can make
a legitimate mistake!
But How Well Do We REALLY Know Him?
HelpSystems Corporate Overview. All rights reserved.
IBM i vs. Unix vs. PC
HelpSystems Corporate Overview. All rights reserved.
In IBM i, every object has data authorities and object
authorities.
Data authorities consist of:
Read, Add, Update, Delete, and Execute.
Object Authorities consist of:
Opr, Mgt, Exist, Alter, and Ref.
IBM i authorities (data and object) are typically assigned
using one of four IBM-supplied templates:
*USE, *CHANGE, *ALL, and *EXCLUDE
Object Authority vs. Data Authority
HelpSystems Corporate Overview. All rights reserved.
• Data Authorities
– *READ - Required to read the object
– *ADD, *UPD, *DLT - Required to change the object
– *EXECUTE - Required to run a program or find an object
• Object Authorities
– *OBJOPR - Required to operate on data (set if there are any data authorities)
– *OBJMGT - Required to move, rename, or work with permissions
– *OBJEXIST - Required to delete, save, and restore the object
– *OBJALTER - Database authority
– *OBJREF - Database authority
• IBM-Supplied Templates
– *EXCLUDE - Specifically denies access to the object
– *USE - *OBJOPR and *READ and *EXECUTE
– *CHANGE - *OBJOPR and all data authorities
– *ALL - All data and object authorities
IBM i Authorities
HelpSystems Corporate Overview. All rights reserved.
The IFS security model is a unique combination of
IBM i authorities, PC file properties, and Unix file
permissions.
IFS
Security
IBM i
Authorities
IBM i Authorities
HelpSystems Corporate Overview. All rights reserved.
For IFS objects, ‘Opr’ (Object Operational)
authority is considered a data authority and NOT
an object authority.
Object Authority vs. Data Authority
HelpSystems Corporate Overview. All rights reserved.
In Unix terminology, we secure files and directories
using a combination of Read (*R), Write (*W), and
Execute (*X) permissions.
As with *USE, *RX provides Read and Execute data
authority and no object authorities (except ‘Opr’ as noted
on the prior slide).
As with *CHANGE, *RWX provides all data authorities
and no object authorities (except ‘Opr’ as noted on the
prior slide).
There’s no
UNIX
equivalent
of *ALL
*CHANGE
*USE
UNIX Permissions
HelpSystems Corporate Overview. All rights reserved.
PC properties, such as ‘read-only,’ are another
layer of protection against object abuse. Even
*ALLOBJ users are unable to delete a file
marked as read-only.
Other file properties include:
– Need to archive (PC and system)
– Hidden file
– PC system file
PC Properties
HelpSystems Corporate Overview. All rights reserved.
PC properties can be viewed
and altered using:
– IBM i’s CHGATR command
– Navigator for i properties
– Windows Explorer Properties
(NetServer)
– DOS “attrib” commands
PC Properties
HelpSystems Corporate Overview. All rights reserved.
IBM i supports a check out/check in capability that
restricts certain functions to the user that has
checked out the file.
This process can be performed via:
– Navigator for i
– Check Out (CHKOUT) Command
– Check In (CHKIN) Command
IBM added subtree support in v6.1 so that users can now check
out/in entire folders or directories.
PC Properties
HelpSystems Corporate Overview. All rights reserved.
Under the covers, all IFS objects are still IBM i
objects and therefore have IBM i authorities.
Actions must still meet the requirements set forth by
IBM i.
For example:
To delete a stream file, you must have *OBJEXIST
authority. This is an object authority that’s not
associated with *R, *W, or *X and must be granted
separately, or inherited from the directory.
IBM i Authorities
HelpSystems Corporate Overview. All rights reserved.
Batten Down The Hatches
HelpSystems Corporate Overview. All rights reserved.
With the exception of ‘root,’ most IBM directories are
already configured with the appropriate security
settings. Vendor or user directories may not be.
It’s easy to “over secure” the IFS due to the nature
of nested directories and unfamiliar security
mechanisms.
Plan carefully and make detailed notes of changes so
that you can always revert back if there is a
problem.
It All Starts At The “Root”
HelpSystems Corporate Overview. All rights reserved.
The ‘root’ (/) folder ships with powerful
*PUBLIC permissions:
DTAAUT(*RWX)
OBJAUT(*ALL)
Instead, consider assigning the following:
DTAAUT(*RX)
OBJAUT(*NONE)
Do NOT set
*PUBLIC to
*EXCLUDE
Restrict The Right To Write
HelpSystems Corporate Overview. All rights reserved.
A user requires *X authority to each directory
in the folder structure. However, without *R,
they cannot see the contents of the directory.
Consider whether a user should be able to
access (read or write) the contents of the
parent folder(s) or just simply navigate to
a subfolder.
Restrict The Right To Write
HelpSystems Corporate Overview. All rights reserved.
Consider giving users their own directory under
‘/home’:
Set DTAAUT(*X) for *PUBLIC on ‘/home’
Set DTAAUT(*EXCLUDE) for *PUBLIC on all user
directories
Set DTAARA(*RWX) for the user on their own
directory (e.g. ‘/home/rtatam’)
This enables a user to access his or her own directory, but not
touch (or see) other users' directories.
Restrict The Right To Write
HelpSystems Corporate Overview. All rights reserved.
IFS Permissions can be assigned through a traditional
green screen interface using:
WRKAUT, CHGAUT, DSPAUT
Or through the Navigator for i interface.
Restrict The Right To Write
HelpSystems Corporate Overview. All rights reserved.
Most organizations don’t need users to be able to
access the native libraries and objects from remote
clients like Access for i, NetServer, and Java
Toolbox.
Fortunately, IBM provides an authorization list to
control who can access QSYS.LIB:
Authorization List QPWFSERVER
Default *PUBLIC *USE
Recommended *PUBLIC *EXCLUDE
Warning: Not effective against *ALLOBJ users!
Restrict Access to Qsys.lib
HelpSystems Corporate Overview. All rights reserved.
Many organizations make their IFS accessible to
client users by establishing unnecessary file
shares. Use Navigator for i to:
– Review & eliminate unnecessary file shares
– Make shares “read only” when possible
– Grant only *X permission to folders in shared
path
– Do NOT share the ‘root’ (/) folder
Don’t give
every
user access to
IBM i Nav
Manage File Shares
HelpSystems Corporate Overview. All rights reserved.
Similar to auditing of IBM i objects, the IFS also
supports event auditing.
– Ensure QAUDCTL system value includes the value
of *OBJAUD to “turn on” object auditing.
– Use CHGAUD command to specify the desired level
of auditing for each object or directory.
Deploy exit
programs to
better
audit IFS events
Audit IFS object Access
HelpSystems Corporate Overview. All rights reserved.
As with libraries, each directory has a Create
Object Auditing (CRTOBJAUD) value to
designate the auditing default for the contents
as they are created.
You need audit (*AUDIT) or all object (*ALLOBJ)
special authority to see the assigned auditing
setting:
*SYSVAL, *USRPRF, *CHANGE, *ALL, *NONE
Audit IFS object Access
HelpSystems Corporate Overview. All rights reserved.
IFS commands are (by default) secured from limited
capability users - LMTCPB(*YES).
Command-capable users might have access to the
following powerful native IFS commands:
Command(s) Shipped *PUBLIC
WRKLNK *USE
MD | MKDIR | CRTDIR *USE
RD | RMDIR | RMVDIR *USE
CD | CHGDIR | CHGCURDIR *USE
Secure Native IFS Commands
HelpSystems Corporate Overview. All rights reserved.
Other powerful IFS commands to be guarded
include:
CPYTOSTMF Copy to Stream File
CPYFRMSTMF Copy From Stream File
CPYTOIMPF Copy To Import File
CPYFRMIMPF Copy From Import File
WRKAUT | CHGAUT Work | Change Authority
CHGOWN Change Owner
SAV | RST Save | Restore
Secure Native IFS Commands
HelpSystems Corporate Overview. All rights reserved.
The IFS does NOT support the adoption of authority.
This can represent a challenge to applications that
are built on a foundation of adoption.
Profile switching IS supported in the IFS, so use the
IBM-provided APIs or a
tool like PowerTech Authority
Broker to temporarily alter
user privileges—
akin to Superman’s phone booth.
Authority Adoption and Profile Switching
HelpSystems Corporate Overview. All rights reserved.
(Overly)
Privileged
Users
Permissive
Public & Private
Authority
Your
Security
Security Is At The Mercy Of Multiple Controls
HelpSystems Corporate Overview. All rights reserved.
Exit points enable a process to be
temporarily “interrupted” by a user-
written program.
There’s an exit point for FTP and
ODBC, and yes, IFS!
(Strongly) Consider implementing an
exit program to audit and control
actions affecting the IFS.
Another Great Reason For An Exit Program
HelpSystems Corporate Overview. All rights reserved.
The IFS exit point provides easy-to-interpret interrogation
and supplemental control of user activities, including:
• Allocate conversation
• Change file attributes request
• Create stream file or directory
• Delete file or directory
• List file attributes (or directory contents)
• Move file
• Open stream file
• Rename file
Works with
*ALLOBJ
users
Another Great Reason For An Exit Program
HelpSystems Corporate Overview. All rights reserved.
An example of recording user activities within the IFS
using an exit program:
Another Great Reason For An Exit Program
HelpSystems Corporate Overview. All rights reserved.
Don’t Overlook Disruption By Viruses
HelpSystems Corporate Overview. All rights reserved.
Long thought to be immune to
the virus threat, IBM i can
actually act as the source of
virus problems on your
network.
While malicious code can
reside natively, viruses can
often impact the IFS.
A Virus On IBM i? Oh, Surely Not!
And don’t think they can’t rename, delete, or encrypt native objects!
HelpSystems Corporate Overview. All rights reserved.
Image Catalogs,
NSF Mounts, UDFS Mounts
Business Partners
CDs
High Availability Systems
Backup Tapes
Mapped Drives
FTP
How Viruses Can Spread To and From IBM i
HelpSystems Corporate Overview. All rights reserved.
How Viruses Can Spread To and From IBM i
HelpSystems Corporate Overview. All rights reserved.
How Viruses Can Spread To and From IBM i
HelpSystems Corporate Overview. All rights reserved.
IBM i added system values (QSCANFS, QSCANFSCTL)
to interface with a commercial scanning solution for:
• On-demand scanning
• Open/close scanning (V5R3+) via exit point integration
QIBM_QP0L_SCAN_OPEN – IFS Scan on Open
QIBM_QP0L_SCAN_CLOSE – IFS Scan on Close
• Object integrity
• Alerting
Check out
StandGuard
Anti-Virus
Protect & Immunize Objects With Commercial Anti-Virus
HelpSystems Corporate Overview. All rights reserved.
Scanning from another server is BAD for several
compelling reasons:
• Requires a read/write share to ‘root’ to search and
cleanse all directories
• Requires an *ALLOBJ profile to effectively run the scan
• Network bandwidth is consumed by hundreds of
thousands of objects being moved around
• Transmits all objects in clear text
• The operating system remains unaware that a file is infected
But Don’t Scan From The Network!
HelpSystems Corporate Overview. All rights reserved.
…Or You Might Make The Situation Worse!
HelpSystems Corporate Overview. All rights reserved.
• Determine what applications are using the IFS (Exit program)
• Understand how security works on the IFS
• Establish security for top-level folders like ‘root’ and ‘/home’
• Secure access to /QSYS.LIB
• Monitor and protect file shares (don’t share ‘root’) and make them
read-only whenever possible
• Audit and alert on user activities using an exit program
• Protect from viruses
• Test your security!
Summary Of Today’s Lesson
HelpSystems Corporate Overview. All rights reserved.
Run a HelpSystems Security Scan
HelpSystems Corporate Overview. All rights reserved.
Security awareness among IBM i
professionals is generally low.
IBM i awareness among audit
professionals is even lower.
Some of the most valuable data is
stored on a Power Systems server
(iSeries, AS/400).
Most IBM i data is not secured and
the users are far too powerful.
Most data is easily accessed via PC
interfaces with little-to-no oversight
The Perfect IBM i Security “Storm”
HelpSystems Corporate Overview. All rights reserved.
Free Download:
2016 State of IBM i Security
https://www.mc-store.com/products/ibm-i-security-
administration-and-compliance-second-edition
Learn More About IBM i Security
HelpSystems Corporate Overview. All rights reserved.
Question And Answer
HelpSystems Corporate Overview. All rights reserved.
Register Online at
http://www.helpsystems.com/getting-started-security-series
See you on July 26th at 12 noon CST to discuss Public Authority
Final Episode Coming Soon!

More Related Content

PDF
CS6401 OPERATING SYSTEMS Unit 3
PPT
Chapter 9 - Virtual Memory
PPTX
Secondary Storage Management
PDF
System Development Life Cycle (SDLC) - Part I
PPTX
Chapter 4
PPT
Contiguous Memory Allocation.ppt
PPT
Hci lecture set_03_00
PPTX
Sisteme de Operare: Planificarea proceselor, IPC
CS6401 OPERATING SYSTEMS Unit 3
Chapter 9 - Virtual Memory
Secondary Storage Management
System Development Life Cycle (SDLC) - Part I
Chapter 4
Contiguous Memory Allocation.ppt
Hci lecture set_03_00
Sisteme de Operare: Planificarea proceselor, IPC

What's hot (20)

PPTX
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
PDF
Threads
PPT
Chapter 7 - Deadlocks
PDF
MPI Tutorial
PPT
Unix file api’s
PPTX
evolution of operating system
PPTX
AI Programming language (LISP)
PPTX
Operating system-1
PDF
OS file systems
PPSX
CPU Scheduling algorithms
PDF
System Life Cycle
PDF
Hardware & Software Platforms for HPC, AI and ML
PPT
NAS Concepts
PPTX
Process management in operating system | process states | PCB | FORK() | Zomb...
PPTX
Threads in Operating System | Multithreading | Interprocess Communication
PPTX
Operations on Processes
PDF
G108277 ds8000-resiliency-lagos-v1905c
PPTX
Operating system paging and segmentation
PPT
Operating Systems - "Chapter 4: Multithreaded Programming"
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Threads
Chapter 7 - Deadlocks
MPI Tutorial
Unix file api’s
evolution of operating system
AI Programming language (LISP)
Operating system-1
OS file systems
CPU Scheduling algorithms
System Life Cycle
Hardware & Software Platforms for HPC, AI and ML
NAS Concepts
Process management in operating system | process states | PCB | FORK() | Zomb...
Threads in Operating System | Multithreading | Interprocess Communication
Operations on Processes
G108277 ds8000-resiliency-lagos-v1905c
Operating system paging and segmentation
Operating Systems - "Chapter 4: Multithreaded Programming"
Ad

Similar to Getting Started with IBM i Security: Integrated File System (IFS) (20)

PPTX
Configuration Tips to Reduce the Risk of IBM i Malware Infection
PPTX
5 Things Your Security Administrator Should Tell You
PDF
Working with the IFS on System i
PDF
Best Practices in IBM i Security
PPTX
Getting Started with IBM i Security: Securing PC Access
PDF
Security best practices for informix
PPTX
IBM i Security Best Practices
PPTX
The Truth About Viruses on IBM i
ODP
NTFS and Inode
PDF
StandGuard Anti-Virus Tech Pack
PDF
Getting Started with IBM i Security: User Privileges
PPTX
The Truth About Viruses on IBM i
PDF
Expand Your Control of Access to IBM i Systems and Data
PPTX
Database 101 on IBM i
PPTX
What Does a Full Featured Security Strategy Look Like?
PDF
Controlling Access to IBM i Systems and Data
PPTX
Mwlug2014 - IBM Connections Security and Migration
PDF
Revealing the 2016 State of IBM i Security
PDF
IBM i Security Exposures Infographic
PPTX
IBM Workload Scheduler for z/OS Security with RACF & IBM zSecure
Configuration Tips to Reduce the Risk of IBM i Malware Infection
5 Things Your Security Administrator Should Tell You
Working with the IFS on System i
Best Practices in IBM i Security
Getting Started with IBM i Security: Securing PC Access
Security best practices for informix
IBM i Security Best Practices
The Truth About Viruses on IBM i
NTFS and Inode
StandGuard Anti-Virus Tech Pack
Getting Started with IBM i Security: User Privileges
The Truth About Viruses on IBM i
Expand Your Control of Access to IBM i Systems and Data
Database 101 on IBM i
What Does a Full Featured Security Strategy Look Like?
Controlling Access to IBM i Systems and Data
Mwlug2014 - IBM Connections Security and Migration
Revealing the 2016 State of IBM i Security
IBM i Security Exposures Infographic
IBM Workload Scheduler for z/OS Security with RACF & IBM zSecure
Ad

More from HelpSystems (20)

PPTX
El Estado de la Seguridad de IBM i en 2020
PPTX
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
PPTX
Rbt jdbc odbc webinar
PPTX
RPA en 45 minutos
PPTX
Webinar go anywhere_mft_scripts
PPTX
Automatización de Procesos de IT
PPTX
Hs 2020-ibmi-marketplace-spanish v3
PPTX
Mft 45 minutos
PPTX
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
PPTX
Centro de Excelencia en Automatización 3
PPTX
Cómo crear un Centro de Excelencia de Automatización 2
PPTX
Construyendo un Centro de Excelencia de Automatización PARTE 1
PPTX
Webinar Vityl IT & Business Monitoring
PPTX
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
PPTX
Mft 45 minutos
PPTX
Automate feature tour
PPTX
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
PPTX
5 problemas del intercambio de archivos mediante scripts
PPTX
CASO DE ÉXITO: Grupo Banco San Juan
PPTX
Webinar Security Scan
El Estado de la Seguridad de IBM i en 2020
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
Rbt jdbc odbc webinar
RPA en 45 minutos
Webinar go anywhere_mft_scripts
Automatización de Procesos de IT
Hs 2020-ibmi-marketplace-spanish v3
Mft 45 minutos
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
Centro de Excelencia en Automatización 3
Cómo crear un Centro de Excelencia de Automatización 2
Construyendo un Centro de Excelencia de Automatización PARTE 1
Webinar Vityl IT & Business Monitoring
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
Mft 45 minutos
Automate feature tour
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
5 problemas del intercambio de archivos mediante scripts
CASO DE ÉXITO: Grupo Banco San Juan
Webinar Security Scan

Recently uploaded (20)

PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
Understanding Forklifts - TECH EHS Solution
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
Reimagine Home Health with the Power of Agentic AI​
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
top salesforce developer skills in 2025.pdf
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Softaken Excel to vCard Converter Software.pdf
PPTX
L1 - Introduction to python Backend.pptx
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
Operating system designcfffgfgggggggvggggggggg
Understanding Forklifts - TECH EHS Solution
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Odoo Companies in India – Driving Business Transformation.pdf
Reimagine Home Health with the Power of Agentic AI​
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
VVF-Customer-Presentation2025-Ver1.9.pptx
top salesforce developer skills in 2025.pdf
Computer Software and OS of computer science of grade 11.pptx
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Softaken Excel to vCard Converter Software.pdf
L1 - Introduction to python Backend.pptx
wealthsignaloriginal-com-DS-text-... (1).pdf
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf

Getting Started with IBM i Security: Integrated File System (IFS)

  • 1. All trademarks and registered trademarks are the property of their respective owners.© HelpSystems LLC. All rights reserved. Getting Started With IBM i Security: IFS Security
  • 2. HelpSystems Corporate Overview. All rights reserved. ROBIN TATAM, CBCA CISM Director of Security Technologies 952-563-2768 robin.tatam@helpsystems.com Your Speaker
  • 3. HelpSystems Corporate Overview. All rights reserved. • Premier Security Products (globally-recognized “PowerTech” brand) – Represented by industry veteran, Robin Tatam, CISM • Comprehensive IBM i Security Services – Represented by industry veteran, Carol Woodbury, CRISC • Member of PCI Security Standards Council • Authorized by NASBA to issue CPE Credits for Security Education • Publisher of the Annual “State of IBM i Security” Report About HelpSystems’ Security Investment
  • 4. HelpSystems Corporate Overview. All rights reserved. What Is The Mysterious IFS?
  • 5. HelpSystems Corporate Overview. All rights reserved. Independent Front Suspension Indian Fertility Society Initial Flight Screening Initiative on Financial Security Institute for Fiscal Studies Insurance and Financial Services Intensive Freshman Seminar International Financial Statistics International Food Standard Integrated Forecast System According to Wikipedia, it can be many things to many people: What Is The Mysterious IFS?
  • 6. HelpSystems Corporate Overview. All rights reserved. Integrated File System Integrated File System - on IBM midrange & mainframe systems (e.g. OS/400, MVS, VM/CMS), the POSIX compatible file system provided by the operating system, as opposed to the traditional non-POSIX file system it also supplies. What Is The Mysterious IFS?
  • 7. HelpSystems Corporate Overview. All rights reserved. • Added to OS/400 in V3R1 in 1994 • Integrates IBM i with UNIX, Windows, and others • Directory structure much like a PC • Provides access to data stored on integrated servers, or on other remote IBM i servers • Contains several pre-defined file systems: – All contained within a single root directory – Each with their own limitations and rules What Is The Mysterious IFS?
  • 8. HelpSystems Corporate Overview. All rights reserved. Contrary to popular belief, it was not an add-on to the existing file structures, but rather encompasses ALL of the file structures. This includes those that pre-date the IFS such as: Native Libraries QSYS.LIB Documents and Folders QDLS What Is The Mysterious IFS?
  • 9. HelpSystems Corporate Overview. All rights reserved. We ALL technically use the IFS as it encompasses QSYS.LIB Some other common uses of the IFS include: • Integrated PC servers (Intel processor) • NetServer (Explorer access to the IFS) • CD images for unattended installation • PASE environment for UNIX applications • IBM i Access (Client Access) & Navigator executables • Apache HTTP server • Tomcat application server • WebSphere application server • Lotus Domino • Digital Certificate Manager “I’m Not Even Using The ISF, I mean IFS!”
  • 10. HelpSystems Corporate Overview. All rights reserved. IBM i ships with its public access default to the IFS set to: Native objects = *CHANGE IFS root folder = *RWX plus all object authorities (aka *ALL) TIP: This should be changed ASAP! It’s Already Secure, Right?!”
  • 11. HelpSystems Corporate Overview. All rights reserved. Organizations often place tremendous trust in the people accessing their servers. Authorized users usually have privileges far in excess of any business requirement. “But Bill Has Worked Here for xx Years!” (insert big number)
  • 12. HelpSystems Corporate Overview. All rights reserved. According to the “State of IBM i Security Study,” most organizations still base their security on lack of user knowledge or malicious intent. • Average of 147 users with *ALLOBJ special authority • Average of 76 enabled profiles with default passwords “But Bill Has Worked Here for xx Years!” (insert big number)
  • 13. HelpSystems Corporate Overview. All rights reserved. Lots of people have skeletons in their closet! The cold reality of an economic downturn may cause (normally) trustworthy users to act out of desperation. And there are vices like gambling and drugs that often influence ethics. And, of course, anyone can make a legitimate mistake! But How Well Do We REALLY Know Him?
  • 14. HelpSystems Corporate Overview. All rights reserved. IBM i vs. Unix vs. PC
  • 15. HelpSystems Corporate Overview. All rights reserved. In IBM i, every object has data authorities and object authorities. Data authorities consist of: Read, Add, Update, Delete, and Execute. Object Authorities consist of: Opr, Mgt, Exist, Alter, and Ref. IBM i authorities (data and object) are typically assigned using one of four IBM-supplied templates: *USE, *CHANGE, *ALL, and *EXCLUDE Object Authority vs. Data Authority
  • 16. HelpSystems Corporate Overview. All rights reserved. • Data Authorities – *READ - Required to read the object – *ADD, *UPD, *DLT - Required to change the object – *EXECUTE - Required to run a program or find an object • Object Authorities – *OBJOPR - Required to operate on data (set if there are any data authorities) – *OBJMGT - Required to move, rename, or work with permissions – *OBJEXIST - Required to delete, save, and restore the object – *OBJALTER - Database authority – *OBJREF - Database authority • IBM-Supplied Templates – *EXCLUDE - Specifically denies access to the object – *USE - *OBJOPR and *READ and *EXECUTE – *CHANGE - *OBJOPR and all data authorities – *ALL - All data and object authorities IBM i Authorities
  • 17. HelpSystems Corporate Overview. All rights reserved. The IFS security model is a unique combination of IBM i authorities, PC file properties, and Unix file permissions. IFS Security IBM i Authorities IBM i Authorities
  • 18. HelpSystems Corporate Overview. All rights reserved. For IFS objects, ‘Opr’ (Object Operational) authority is considered a data authority and NOT an object authority. Object Authority vs. Data Authority
  • 19. HelpSystems Corporate Overview. All rights reserved. In Unix terminology, we secure files and directories using a combination of Read (*R), Write (*W), and Execute (*X) permissions. As with *USE, *RX provides Read and Execute data authority and no object authorities (except ‘Opr’ as noted on the prior slide). As with *CHANGE, *RWX provides all data authorities and no object authorities (except ‘Opr’ as noted on the prior slide). There’s no UNIX equivalent of *ALL *CHANGE *USE UNIX Permissions
  • 20. HelpSystems Corporate Overview. All rights reserved. PC properties, such as ‘read-only,’ are another layer of protection against object abuse. Even *ALLOBJ users are unable to delete a file marked as read-only. Other file properties include: – Need to archive (PC and system) – Hidden file – PC system file PC Properties
  • 21. HelpSystems Corporate Overview. All rights reserved. PC properties can be viewed and altered using: – IBM i’s CHGATR command – Navigator for i properties – Windows Explorer Properties (NetServer) – DOS “attrib” commands PC Properties
  • 22. HelpSystems Corporate Overview. All rights reserved. IBM i supports a check out/check in capability that restricts certain functions to the user that has checked out the file. This process can be performed via: – Navigator for i – Check Out (CHKOUT) Command – Check In (CHKIN) Command IBM added subtree support in v6.1 so that users can now check out/in entire folders or directories. PC Properties
  • 23. HelpSystems Corporate Overview. All rights reserved. Under the covers, all IFS objects are still IBM i objects and therefore have IBM i authorities. Actions must still meet the requirements set forth by IBM i. For example: To delete a stream file, you must have *OBJEXIST authority. This is an object authority that’s not associated with *R, *W, or *X and must be granted separately, or inherited from the directory. IBM i Authorities
  • 24. HelpSystems Corporate Overview. All rights reserved. Batten Down The Hatches
  • 25. HelpSystems Corporate Overview. All rights reserved. With the exception of ‘root,’ most IBM directories are already configured with the appropriate security settings. Vendor or user directories may not be. It’s easy to “over secure” the IFS due to the nature of nested directories and unfamiliar security mechanisms. Plan carefully and make detailed notes of changes so that you can always revert back if there is a problem. It All Starts At The “Root”
  • 26. HelpSystems Corporate Overview. All rights reserved. The ‘root’ (/) folder ships with powerful *PUBLIC permissions: DTAAUT(*RWX) OBJAUT(*ALL) Instead, consider assigning the following: DTAAUT(*RX) OBJAUT(*NONE) Do NOT set *PUBLIC to *EXCLUDE Restrict The Right To Write
  • 27. HelpSystems Corporate Overview. All rights reserved. A user requires *X authority to each directory in the folder structure. However, without *R, they cannot see the contents of the directory. Consider whether a user should be able to access (read or write) the contents of the parent folder(s) or just simply navigate to a subfolder. Restrict The Right To Write
  • 28. HelpSystems Corporate Overview. All rights reserved. Consider giving users their own directory under ‘/home’: Set DTAAUT(*X) for *PUBLIC on ‘/home’ Set DTAAUT(*EXCLUDE) for *PUBLIC on all user directories Set DTAARA(*RWX) for the user on their own directory (e.g. ‘/home/rtatam’) This enables a user to access his or her own directory, but not touch (or see) other users' directories. Restrict The Right To Write
  • 29. HelpSystems Corporate Overview. All rights reserved. IFS Permissions can be assigned through a traditional green screen interface using: WRKAUT, CHGAUT, DSPAUT Or through the Navigator for i interface. Restrict The Right To Write
  • 30. HelpSystems Corporate Overview. All rights reserved. Most organizations don’t need users to be able to access the native libraries and objects from remote clients like Access for i, NetServer, and Java Toolbox. Fortunately, IBM provides an authorization list to control who can access QSYS.LIB: Authorization List QPWFSERVER Default *PUBLIC *USE Recommended *PUBLIC *EXCLUDE Warning: Not effective against *ALLOBJ users! Restrict Access to Qsys.lib
  • 31. HelpSystems Corporate Overview. All rights reserved. Many organizations make their IFS accessible to client users by establishing unnecessary file shares. Use Navigator for i to: – Review & eliminate unnecessary file shares – Make shares “read only” when possible – Grant only *X permission to folders in shared path – Do NOT share the ‘root’ (/) folder Don’t give every user access to IBM i Nav Manage File Shares
  • 32. HelpSystems Corporate Overview. All rights reserved. Similar to auditing of IBM i objects, the IFS also supports event auditing. – Ensure QAUDCTL system value includes the value of *OBJAUD to “turn on” object auditing. – Use CHGAUD command to specify the desired level of auditing for each object or directory. Deploy exit programs to better audit IFS events Audit IFS object Access
  • 33. HelpSystems Corporate Overview. All rights reserved. As with libraries, each directory has a Create Object Auditing (CRTOBJAUD) value to designate the auditing default for the contents as they are created. You need audit (*AUDIT) or all object (*ALLOBJ) special authority to see the assigned auditing setting: *SYSVAL, *USRPRF, *CHANGE, *ALL, *NONE Audit IFS object Access
  • 34. HelpSystems Corporate Overview. All rights reserved. IFS commands are (by default) secured from limited capability users - LMTCPB(*YES). Command-capable users might have access to the following powerful native IFS commands: Command(s) Shipped *PUBLIC WRKLNK *USE MD | MKDIR | CRTDIR *USE RD | RMDIR | RMVDIR *USE CD | CHGDIR | CHGCURDIR *USE Secure Native IFS Commands
  • 35. HelpSystems Corporate Overview. All rights reserved. Other powerful IFS commands to be guarded include: CPYTOSTMF Copy to Stream File CPYFRMSTMF Copy From Stream File CPYTOIMPF Copy To Import File CPYFRMIMPF Copy From Import File WRKAUT | CHGAUT Work | Change Authority CHGOWN Change Owner SAV | RST Save | Restore Secure Native IFS Commands
  • 36. HelpSystems Corporate Overview. All rights reserved. The IFS does NOT support the adoption of authority. This can represent a challenge to applications that are built on a foundation of adoption. Profile switching IS supported in the IFS, so use the IBM-provided APIs or a tool like PowerTech Authority Broker to temporarily alter user privileges— akin to Superman’s phone booth. Authority Adoption and Profile Switching
  • 37. HelpSystems Corporate Overview. All rights reserved. (Overly) Privileged Users Permissive Public & Private Authority Your Security Security Is At The Mercy Of Multiple Controls
  • 38. HelpSystems Corporate Overview. All rights reserved. Exit points enable a process to be temporarily “interrupted” by a user- written program. There’s an exit point for FTP and ODBC, and yes, IFS! (Strongly) Consider implementing an exit program to audit and control actions affecting the IFS. Another Great Reason For An Exit Program
  • 39. HelpSystems Corporate Overview. All rights reserved. The IFS exit point provides easy-to-interpret interrogation and supplemental control of user activities, including: • Allocate conversation • Change file attributes request • Create stream file or directory • Delete file or directory • List file attributes (or directory contents) • Move file • Open stream file • Rename file Works with *ALLOBJ users Another Great Reason For An Exit Program
  • 40. HelpSystems Corporate Overview. All rights reserved. An example of recording user activities within the IFS using an exit program: Another Great Reason For An Exit Program
  • 41. HelpSystems Corporate Overview. All rights reserved. Don’t Overlook Disruption By Viruses
  • 42. HelpSystems Corporate Overview. All rights reserved. Long thought to be immune to the virus threat, IBM i can actually act as the source of virus problems on your network. While malicious code can reside natively, viruses can often impact the IFS. A Virus On IBM i? Oh, Surely Not! And don’t think they can’t rename, delete, or encrypt native objects!
  • 43. HelpSystems Corporate Overview. All rights reserved. Image Catalogs, NSF Mounts, UDFS Mounts Business Partners CDs High Availability Systems Backup Tapes Mapped Drives FTP How Viruses Can Spread To and From IBM i
  • 44. HelpSystems Corporate Overview. All rights reserved. How Viruses Can Spread To and From IBM i
  • 45. HelpSystems Corporate Overview. All rights reserved. How Viruses Can Spread To and From IBM i
  • 46. HelpSystems Corporate Overview. All rights reserved. IBM i added system values (QSCANFS, QSCANFSCTL) to interface with a commercial scanning solution for: • On-demand scanning • Open/close scanning (V5R3+) via exit point integration QIBM_QP0L_SCAN_OPEN – IFS Scan on Open QIBM_QP0L_SCAN_CLOSE – IFS Scan on Close • Object integrity • Alerting Check out StandGuard Anti-Virus Protect & Immunize Objects With Commercial Anti-Virus
  • 47. HelpSystems Corporate Overview. All rights reserved. Scanning from another server is BAD for several compelling reasons: • Requires a read/write share to ‘root’ to search and cleanse all directories • Requires an *ALLOBJ profile to effectively run the scan • Network bandwidth is consumed by hundreds of thousands of objects being moved around • Transmits all objects in clear text • The operating system remains unaware that a file is infected But Don’t Scan From The Network!
  • 48. HelpSystems Corporate Overview. All rights reserved. …Or You Might Make The Situation Worse!
  • 49. HelpSystems Corporate Overview. All rights reserved. • Determine what applications are using the IFS (Exit program) • Understand how security works on the IFS • Establish security for top-level folders like ‘root’ and ‘/home’ • Secure access to /QSYS.LIB • Monitor and protect file shares (don’t share ‘root’) and make them read-only whenever possible • Audit and alert on user activities using an exit program • Protect from viruses • Test your security! Summary Of Today’s Lesson
  • 50. HelpSystems Corporate Overview. All rights reserved. Run a HelpSystems Security Scan
  • 51. HelpSystems Corporate Overview. All rights reserved. Security awareness among IBM i professionals is generally low. IBM i awareness among audit professionals is even lower. Some of the most valuable data is stored on a Power Systems server (iSeries, AS/400). Most IBM i data is not secured and the users are far too powerful. Most data is easily accessed via PC interfaces with little-to-no oversight The Perfect IBM i Security “Storm”
  • 52. HelpSystems Corporate Overview. All rights reserved. Free Download: 2016 State of IBM i Security https://www.mc-store.com/products/ibm-i-security- administration-and-compliance-second-edition Learn More About IBM i Security
  • 53. HelpSystems Corporate Overview. All rights reserved. Question And Answer
  • 54. HelpSystems Corporate Overview. All rights reserved. Register Online at http://www.helpsystems.com/getting-started-security-series See you on July 26th at 12 noon CST to discuss Public Authority Final Episode Coming Soon!