SlideShare a Scribd company logo
IBM Cognos® Security Best
Practices	
  

Wisconsin User Group, March 2014





Kirk Wiseman
PerformanceG2, Inc.
Agenda
!   Authentication versus Authorization
!   Overview Cognos Security
!   Best Practices
!   Questions
Authentication vs Authorization
!  	
  Cognos	
  security	
  is	
  based	
  on	
  authen2ca2on	
  and	
  authoriza2on	
  
!  	
  Authen2ca2on	
  -­‐-­‐	
  	
  You	
  are	
  who	
  you	
  say	
  you	
  are.	
  
!  	
  Authoriza2on	
  –	
  What	
  you	
  can	
  or	
  cannot	
  do.	
  
!  	
  Authen2ca2on	
  is	
  handled	
  by	
  a	
  3rd	
  party	
  security	
  tool	
  such	
  as	
  Ac2ve	
  Directory	
  LDAP	
  or	
  
	
  OpenLDAP	
  
!  	
  Authoriza2on	
  is	
  handled	
  through	
  Cognos	
  using	
  groups,	
  roles,	
  capabili2es	
  and	
  
	
  permissions	
  	
  
Cognos Security Overview
!  	
  Namespaces	
  
!  	
  External	
  Authen2ca2on	
  providers	
  are	
  set	
  up	
  as	
  namespaces	
  in	
  Cognos	
  
!  	
  Cognos	
  Namespace	
  	
  
!  A	
  built-­‐in	
  namespace	
  that	
  provides	
  pre-­‐defined	
  security	
  entries,	
  including:	
  
	
  groups,	
  roles,	
  data	
  sources,	
  distribu2on	
  lists	
  and	
  contacts	
  
!  	
  Cannot	
  be	
  deleted	
  
!  	
  Cognos	
  groups	
  and	
  roles	
  are	
  op2onal	
  
!  	
  Cognos	
  Applica2on	
  Firewall	
  (CAF)	
  
!  	
  Acts	
  as	
  a	
  smart	
  proxy	
  for	
  the	
  gateways	
  and	
  dispatchers	
  
!  	
  Analyses,	
  Modifies	
  and	
  validates	
  HTTP	
  and	
  XML	
  requests	
  
!  	
  Prevents	
  Malicious	
  code	
  from	
  being	
  inserted	
  
!  	
  Turned	
  on	
  by	
  default	
  –	
  LEAVE	
  IT	
  ON!	
  
	
  
Cognos Security Best Practices
!  	
  Immediately	
  aVer	
  install	
  and	
  configura2on:	
  
!  Turn	
  off	
  anonymous	
  access	
  and	
  enable	
  an	
  external	
  authen2ca2on	
  provider	
  
!  	
  Add	
  at	
  least	
  two	
  groups	
  of	
  administrators	
  to	
  the	
  Cognos	
  System	
  Administrator	
  
	
  group.	
  
!  	
  Remove	
  the	
  Cognos	
  Everyone	
  Group	
  from	
  Everything	
  
!  	
  Plan	
  your	
  security	
  sooner	
  rather	
  than	
  later	
  
!  	
  Plan	
  it	
  out	
  on	
  paper,	
  excel,	
  etc.	
  first	
  
!  	
  Decide	
  whether	
  you	
  are	
  going	
  to	
  u2lize	
  the	
  op2onal	
  Cognos	
  Groups	
  and	
  Roles,	
  Your	
  
	
  Authen2ca2on	
  provider’s	
  groups	
  or	
  a	
  combina2on	
  of	
  both.	
  
!  	
  Set	
  up	
  capabili2es	
  early	
  
!  	
  Create	
  your	
  folder	
  structure	
  early	
  and	
  set	
  permissions	
  using	
  allow	
  
!  	
  Use	
  DENY	
  sparingly,	
  if	
  at	
  all!!	
  	
  
!  	
  	
  Set	
  up	
  test	
  users	
  and	
  test	
  each	
  and	
  every	
  scenario.	
  
	
  
Cognos Security Best Practices
!  	
  If	
  se]ng	
  up	
  Single	
  Sign-­‐on	
  do	
  it	
  aVer	
  all	
  other	
  tes2ng	
  has	
  been	
  accomplished	
  
!  	
  If	
  access	
  is	
  to	
  be	
  given	
  outside	
  of	
  the	
  company’s	
  firewall	
  then	
  set	
  up	
  SSL	
  
!  	
  Set	
  the	
  Valid	
  domains	
  op2on	
  
!  	
  Maintain	
  a	
  security	
  process	
  document	
  for	
  your	
  organiza2on	
  
A little bit about Permissions
!  	
  Read	
  
!  	
  View	
  all	
  proper2es	
  of	
  an	
  entry,	
  including	
  report	
  specs,	
  report	
  output,	
  etc.	
  
!  	
  Write	
  
!  	
  Modify	
  proper2es	
  of	
  a	
  report	
  
!  	
  Delete	
  an	
  entry	
  
!  	
  Create	
  entries	
  
!  	
  Modify	
  reports	
  
!  	
  Create	
  new	
  outputs	
  
!  	
  Execute	
  
!  	
  Reports,	
  agents,	
  etc	
  can	
  be	
  run.	
  	
  	
  
!  	
  Data	
  Sources	
  can	
  retrieve	
  data.	
  
!  	
  Set	
  Policy	
  
!  	
  Read	
  and	
  modify	
  security	
  se]ngs	
  
!  	
  Traverse	
  
!  The	
  ability	
  to	
  see	
  through	
  an	
  object	
  to	
  its	
  children.	
  	
  
	
  
Permission Examples
Ac#on	
   Permissions	
  Required	
  
Add	
  an	
  entry	
   Write	
  permissions	
  for	
  a	
  parent	
  entry	
  
Query	
  the	
  entry	
  proper#es	
   Read	
  permissions	
  for	
  an	
  entry	
  
View	
  the	
  children	
  of	
  the	
  entry	
   Traverse	
  permissions	
  for	
  an	
  entry	
  
Update	
  an	
  entry	
   Write	
  permissions	
  for	
  an	
  entry	
  
Delete	
  an	
  entry	
   Write	
  permissions	
  for	
  an	
  entry,	
  and	
  write	
  permissions	
  for	
  a	
  
parent	
  entry	
  
Copy	
  an	
  entry	
   Read	
  permissions	
  for	
  an	
  entry	
  and	
  any	
  child	
  entries,	
  traverse	
  
permissions	
  for	
  all	
  of	
  the	
  children,	
  and	
  write	
  and	
  traverse	
  
permissions	
  for	
  the	
  target	
  parent	
  entry	
  
Move	
  an	
  entry	
   Read	
  and	
  write	
  permissions	
  for	
  an	
  entry,	
  write	
  permissions	
  
for	
  both	
  the	
  source	
  parent	
  entry	
  and	
  the	
  target	
  parent	
  entry,	
  
and	
  traverse	
  permissions	
  for	
  the	
  target	
  parent	
  entry	
  
9/2/09	
  
Questions?
Connect with us
!  Call us: 877.742.4276
!  	
  Email us: training@performanceg2.com, info@performanceg2.com
!  	
  Visit our web site: performanceg2.com
!  	
  Watch our Cognos videos at: youtube.com/performanceg2
!  	
  Follow us: twitter.com/performanceg2
!  	
  Read our blog
!  	
  Upcoming events
!  Upcoming training
Thank you for attending!
training@performanceg2.com	
  

More Related Content

PDF
Andriod Pentesting and Malware Analysis
PPTX
Android pen test basics
PPTX
3. backup file artifacts - mazin ahmed
PPTX
Pentesting Android Apps
PPTX
Web application Security tools
PPTX
Presentation on Top 10 Vulnerabilities in Web Application
PDF
Penetration testing web application web application (in) security
PDF
WordPress Security Best Practices
Andriod Pentesting and Malware Analysis
Android pen test basics
3. backup file artifacts - mazin ahmed
Pentesting Android Apps
Web application Security tools
Presentation on Top 10 Vulnerabilities in Web Application
Penetration testing web application web application (in) security
WordPress Security Best Practices

What's hot (20)

PPTX
2 . web app s canners
PPTX
4 . future uni presentation
PDF
Android Security & Penetration Testing
PDF
Owasp top 10 web application security hazards part 2
PPTX
Web application security: Threats & Countermeasures
PDF
Identity theft: Developers are key - JFokus 2017
PPTX
Bypass Security Checking with Frida
PDF
My Null Android Penetration Session
PPTX
Web tools ppt
PPTX
From Reversing to Exploitation
PDF
Web application security & Testing
PDF
Web App Security Presentation by Ryan Holland - 05-31-2017
PDF
Attacking android insecurity
PPTX
Pentesting Android Applications
PDF
Owasp top 10 web application security hazards - Part 1
PDF
10 Mistakes Hackers Want You to Make
PDF
Bulletproof
PPT
Using Proxies To Secure Applications And More
PPTX
[Wroclaw #1] Android Security Workshop
PDF
Intro to Wordpress Security
2 . web app s canners
4 . future uni presentation
Android Security & Penetration Testing
Owasp top 10 web application security hazards part 2
Web application security: Threats & Countermeasures
Identity theft: Developers are key - JFokus 2017
Bypass Security Checking with Frida
My Null Android Penetration Session
Web tools ppt
From Reversing to Exploitation
Web application security & Testing
Web App Security Presentation by Ryan Holland - 05-31-2017
Attacking android insecurity
Pentesting Android Applications
Owasp top 10 web application security hazards - Part 1
10 Mistakes Hackers Want You to Make
Bulletproof
Using Proxies To Secure Applications And More
[Wroclaw #1] Android Security Workshop
Intro to Wordpress Security
Ad

Similar to IBM Cognos 10.2 Security Best Practices (20)

PDF
Ibm cognos bi administrator
PDF
Ibm cognos-administration
PDF
Cognos 11 installation step by step and notes
DOCX
Business intelligence Cognos Workspace Advance step by step guide
PDF
Installing IBM Cognos 10: Tips and Tricks from the Trenches
PDF
The Benefits of Upgrading
PPTX
Lawson Security
DOCX
Ibm cognos to the next level
PPTX
Cognos Performance Inteligencia de negfocios
PDF
Automating Security Management in PBCS!
PPT
Business intelligent
PDF
The Dangers of Elevated IBM i Authorities and How to Manage Them
PPTX
Admin Features Upgraded in Cognos 11.1
PDF
Privileged Access Control & Task Automation: A Win Double of Security and Bus...
DOC
cognos_1
PPTX
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
PDF
Cognos
PPT
LUG 4 8 10
PPTX
Week Topic Code Access vs Event Based.pptx
Ibm cognos bi administrator
Ibm cognos-administration
Cognos 11 installation step by step and notes
Business intelligence Cognos Workspace Advance step by step guide
Installing IBM Cognos 10: Tips and Tricks from the Trenches
The Benefits of Upgrading
Lawson Security
Ibm cognos to the next level
Cognos Performance Inteligencia de negfocios
Automating Security Management in PBCS!
Business intelligent
The Dangers of Elevated IBM i Authorities and How to Manage Them
Admin Features Upgraded in Cognos 11.1
Privileged Access Control & Task Automation: A Win Double of Security and Bus...
cognos_1
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Cognos
LUG 4 8 10
Week Topic Code Access vs Event Based.pptx
Ad

More from PerformanceG2, Inc. (14)

PDF
Introduction to Simulation- Predictive Analytics
PDF
Predictive Analytics Modeling
PDF
An Introduction to Predictive Analytics- An Executive's Guide for Informed De...
PDF
IBM Cognos Insight the Book - An In Depth Presenation by Author Sanjeev Datta
PDF
IBM Cognos 10 - An Introduction
PDF
Business Intelligence for Government - Clark County Family Services Departmen...
PDF
PerformanceG2 Company Profile
PDF
PerformanceG2 Cognos Training Course Catalog 2011
PDF
Performance Management: An Investment in Enterprise Success
PDF
PG2 Multi Dimensional Reporting using Report Studio
PDF
Cognos TM1 for Advanced Users
PDF
PG2 Cognos Express 101
PDF
PG2 Cognos TM1: An Introduction to Design, Maintenance and Performance Tuning
PDF
PG2 Creating Effective Dashboards In Cognos 8
Introduction to Simulation- Predictive Analytics
Predictive Analytics Modeling
An Introduction to Predictive Analytics- An Executive's Guide for Informed De...
IBM Cognos Insight the Book - An In Depth Presenation by Author Sanjeev Datta
IBM Cognos 10 - An Introduction
Business Intelligence for Government - Clark County Family Services Departmen...
PerformanceG2 Company Profile
PerformanceG2 Cognos Training Course Catalog 2011
Performance Management: An Investment in Enterprise Success
PG2 Multi Dimensional Reporting using Report Studio
Cognos TM1 for Advanced Users
PG2 Cognos Express 101
PG2 Cognos TM1: An Introduction to Design, Maintenance and Performance Tuning
PG2 Creating Effective Dashboards In Cognos 8

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
cuic standard and advanced reporting.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Big Data Technologies - Introduction.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Spectroscopy.pptx food analysis technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPT
Teaching material agriculture food technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
cuic standard and advanced reporting.pdf
sap open course for s4hana steps from ECC to s4
Big Data Technologies - Introduction.pptx
The AUB Centre for AI in Media Proposal.docx
Mobile App Security Testing_ A Comprehensive Guide.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Machine learning based COVID-19 study performance prediction
Per capita expenditure prediction using model stacking based on satellite ima...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Spectral efficient network and resource selection model in 5G networks
Advanced methodologies resolving dimensionality complications for autism neur...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Spectroscopy.pptx food analysis technology
“AI and Expert System Decision Support & Business Intelligence Systems”
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Teaching material agriculture food technology
Digital-Transformation-Roadmap-for-Companies.pptx

IBM Cognos 10.2 Security Best Practices

  • 1. IBM Cognos® Security Best Practices   Wisconsin User Group, March 2014 Kirk Wiseman PerformanceG2, Inc.
  • 2. Agenda !   Authentication versus Authorization !   Overview Cognos Security !   Best Practices !   Questions
  • 3. Authentication vs Authorization !    Cognos  security  is  based  on  authen2ca2on  and  authoriza2on   !    Authen2ca2on  -­‐-­‐    You  are  who  you  say  you  are.   !    Authoriza2on  –  What  you  can  or  cannot  do.   !    Authen2ca2on  is  handled  by  a  3rd  party  security  tool  such  as  Ac2ve  Directory  LDAP  or    OpenLDAP   !    Authoriza2on  is  handled  through  Cognos  using  groups,  roles,  capabili2es  and    permissions    
  • 4. Cognos Security Overview !    Namespaces   !    External  Authen2ca2on  providers  are  set  up  as  namespaces  in  Cognos   !    Cognos  Namespace     !  A  built-­‐in  namespace  that  provides  pre-­‐defined  security  entries,  including:    groups,  roles,  data  sources,  distribu2on  lists  and  contacts   !    Cannot  be  deleted   !    Cognos  groups  and  roles  are  op2onal   !    Cognos  Applica2on  Firewall  (CAF)   !    Acts  as  a  smart  proxy  for  the  gateways  and  dispatchers   !    Analyses,  Modifies  and  validates  HTTP  and  XML  requests   !    Prevents  Malicious  code  from  being  inserted   !    Turned  on  by  default  –  LEAVE  IT  ON!    
  • 5. Cognos Security Best Practices !    Immediately  aVer  install  and  configura2on:   !  Turn  off  anonymous  access  and  enable  an  external  authen2ca2on  provider   !    Add  at  least  two  groups  of  administrators  to  the  Cognos  System  Administrator    group.   !    Remove  the  Cognos  Everyone  Group  from  Everything   !    Plan  your  security  sooner  rather  than  later   !    Plan  it  out  on  paper,  excel,  etc.  first   !    Decide  whether  you  are  going  to  u2lize  the  op2onal  Cognos  Groups  and  Roles,  Your    Authen2ca2on  provider’s  groups  or  a  combina2on  of  both.   !    Set  up  capabili2es  early   !    Create  your  folder  structure  early  and  set  permissions  using  allow   !    Use  DENY  sparingly,  if  at  all!!     !      Set  up  test  users  and  test  each  and  every  scenario.    
  • 6. Cognos Security Best Practices !    If  se]ng  up  Single  Sign-­‐on  do  it  aVer  all  other  tes2ng  has  been  accomplished   !    If  access  is  to  be  given  outside  of  the  company’s  firewall  then  set  up  SSL   !    Set  the  Valid  domains  op2on   !    Maintain  a  security  process  document  for  your  organiza2on  
  • 7. A little bit about Permissions !    Read   !    View  all  proper2es  of  an  entry,  including  report  specs,  report  output,  etc.   !    Write   !    Modify  proper2es  of  a  report   !    Delete  an  entry   !    Create  entries   !    Modify  reports   !    Create  new  outputs   !    Execute   !    Reports,  agents,  etc  can  be  run.       !    Data  Sources  can  retrieve  data.   !    Set  Policy   !    Read  and  modify  security  se]ngs   !    Traverse   !  The  ability  to  see  through  an  object  to  its  children.      
  • 8. Permission Examples Ac#on   Permissions  Required   Add  an  entry   Write  permissions  for  a  parent  entry   Query  the  entry  proper#es   Read  permissions  for  an  entry   View  the  children  of  the  entry   Traverse  permissions  for  an  entry   Update  an  entry   Write  permissions  for  an  entry   Delete  an  entry   Write  permissions  for  an  entry,  and  write  permissions  for  a   parent  entry   Copy  an  entry   Read  permissions  for  an  entry  and  any  child  entries,  traverse   permissions  for  all  of  the  children,  and  write  and  traverse   permissions  for  the  target  parent  entry   Move  an  entry   Read  and  write  permissions  for  an  entry,  write  permissions   for  both  the  source  parent  entry  and  the  target  parent  entry,   and  traverse  permissions  for  the  target  parent  entry  
  • 10. Connect with us !  Call us: 877.742.4276 !    Email us: training@performanceg2.com, info@performanceg2.com !    Visit our web site: performanceg2.com !    Watch our Cognos videos at: youtube.com/performanceg2 !    Follow us: twitter.com/performanceg2 !    Read our blog !    Upcoming events !  Upcoming training
  • 11. Thank you for attending! training@performanceg2.com