SlideShare a Scribd company logo
Security 101:
Controlling Access to IBM i
Systems and Data
Barry Kirksey,
Senior Solutions Architect
1
Agenda
1 – IBM i Access Vulnerabilities
2 – Exit Points and Exit Programs
3 – Four Levels of Access Control
4 – Tradeoffs: DIY or Packaged Solutions?
How Syncsort Can Help5 –
• The IBM i is increasingly connected
• Prior to the 1990s, the IBM i was isolated
• In the 1990s IBM opened up the system to TCP/IP
• The numbers of ways the system could be accessed grew
• Legacy, proprietary protocols now cohabitate with new, open-
source protocols – creating access point headaches
• The worldwide hacker community now recognizes the IBM i as a
high-value target
• 4 important levels of access must now be secured
• Network access
• Communication port access
• Database access
• Command access
Why Secure Access Points?
3
• What are exit points and exit programs?
• Exit points and exit programs are powerful tools for access control
• Introduced in 1994 to the AS/400 in V3R1 of the operating system
• Exit points provide “hooks” to invoke one or more user-written
programs—called exit programs—for a variety of OS-related operations
• Exit programs are registered to particular exit points
• How can exit points be used?
• Exit programs can allow or deny access based on parameters such as
permissions, date/time, user profile settings, IP addresses, etc.
• Command exit points can allow or deny command execution based on
context and parameters
• Exit programs can also trigger actions such as logging access attempts,
disabling user profiles, sending an alert, etc.
4
Exit Points and Exit Programs
Securing
Network Access
Security Challenges
• Network protocols make it possible for
users to connect directly to backend
databases on the IBM i
• Network protocols include FTP, ODBC,
JDBC, DDM, DRDA, NetServer and others
• Without proper controls, the system is
open to hackers or internal users who may
create problems
• Without network controls, it is also
possible to remotely execute commands
(e.g. RCMD or REXEC) via FTP, ODBC and
RMTCMD functions
• SQL statements could also be remotely
executed via ODBC, JDBC and DRDA if not
locked down
How Exit Points Can Help
• IBM i provides dozens of exit points that
cover most network access protocols
• Exit programs can be created and assigned
to these exit points
• Exit programs can control access by a
variety of criteria and monitor and log
activity
• When access is controlled through network
exit programs, only the specific operations
defined by the exit program can occur
• Application Administration provides a partial
solution that can control which users can
access particular network functions, but
does not provide logging and cannot be
controlled via granular rules
5
Securing
Com Port Access
Security Challenges
• Some network protocols don’t have their
own exit points and can’t be protected in
the same way
• These network protocols include SSH,
SFTP, SMTP and others
• IT teams may also wish to control
communication access in a way network
or other types of exit points cannot (for
example, specifying a port number)
How Exit Points Can Help
• IBM provides socket exit points
• Socket exit programs secure connections by
specific port and/or IP addresses
• Socket exit programs have limits; e.g. fewer
parameters are available to control inbound
connection
• Socket exit points paired with the other
types of exit point access control methods
provide stronger protection
6
Securing
Database Access
Security Challenges
• Object-level security only goes so far in
controlling access to sensitive data
• Open-source protocols that access data
create particular vulnerabilities
• Open-source protocols include JSON,
Node.js, Python, Ruby and others
• Open-source protocols don’t have their
own exit points
• Without properly securing database
access, data could be viewed or changed
without proper authorization or even
stolen
How Exit Points Can Help
• A powerful exit point called Open Database
File allows exit programs that protect data
from any kind of access
• The exit program can be invoked whenever
a physical file, logical file, SQL table or SQL
view is opened
• The exit program can contain a granular set
of rules that control under what conditions
the file can be accessed and by whom
• The exit program can also be defined to
audit all activity
7
Securing
Command Access
Security Challenges
• The incorrect use of commands by users
can cause considerable damage (deleting
files, ending processes, or worse)
• Access to commands can be controlled to
some extent through user profiles and
object-level security
• A more refined approach to command
control is often required – especially for
powerful profiles
How Exit Points Can Help
• IBM i provides exit points that cover the
use of commands
• Exit programs can be developed to allow or
disallow access to any command within
very specific circumstances
• Command control can be performed
regardless of whether it is performed
within the IBM i or through network access
• Command exit programs supersede
normal object-level security to provide an
additional, very useful layer of security for
users with powerful authorities
8
Tradeoffs
Do-It-Yourself In-House
• Resources may be stretched and pulled
off project
• May need to bring in consultants or hire
new employee because of lack of
knowledge
• Need to stay on top of new PTFs or
updates to the OS
• Knowledgeable resource may leave or
retire
Third-Party Solutions
• Frees up your resources for more important
projects
• Provides separation of duties
• Leverages experts in the field
• Vendor is in the business of releasing
updated software
• Vendors ensure exit programs stay current
to the latest threats and OS capabilities
• Ensures optimal performance of exit
programs
9
How Syncsort
Can Help
10
Data Privacy
Protect the privacy of data at-rest
or in-motion to prevent data
breaches
Access Control
Ensure comprehensive control of
unauthorized access and the
ability to trace any activity,
suspicious or otherwise
Compliance Monitoring
Gain visibility into all security activity
on your IBM i and optionally
feed it to an enterprise console
Security Risk Assessment
Assess your security threats
and vulnerabilities
11
Syncsort can address
the issues on the
radar screen of every
security officer and
IBM i admin
Assure System
Access Manager
Comprehensive control of
external and internal access
• Network access
(FTP, ODBC, JDBC, OLE DB, DDM, DRDA,
NetServer, etc.)
• Communication port access
(using ports, IP addresses, sockets -
covers SSH, SFTP, SMTP, etc.)
• Database access
(open-source protocols - JSON, Node.js,
Python, Ruby, etc.)
• Command access
Powerful, flexible and easy to
manage
• Easy to use graphical interface
• Standard configuration easy deployment
• Powerful, flexible rules for controlling
access based on conditions such as
date/time, user profile settings, IP
addresses, etc.
• Simulation mode for rules testing
• Provides alerts and produces reports
• Logs access data for SIEM integration
Secures IBM i systems and
enables regulatory compliance
• Supports regulatory requirements for SOX,
GDPR, PCI-DSS, HIPAA, and others
• Satisfies security officers by securing
access to IBM i systems and data
• Significantly reduces the time and cost of
achieving regulatory compliance
• Enables implementation of security best
practices
• Quickly detects security incidents so you
can efficiently remediate them
• Has low impact on system performance
12
Expert services are available for
• Security risk assessment
• Quick start services
• Quick check services
• Security update services (hot fixes, PTFs, new releases, etc.)
• System update services (ensuring security solution is properly configured
after system changes to IP addresses, OS versions, etc.)
• Auditor assist (supporting internal or external auditors)
• Managed security services
• A la carte consulting
Leverage the seasoned security experts in Syncsort Global Services!
The Syncsort Services Team
Is Here for You
13
Learn more at
www.syncsort.com/en/assure

More Related Content

PDF
Security 101: Controlling Access to IBM i Systems and Data
PPTX
Taking Control of Access to Your IBM i Systems and Data
PDF
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
PDF
Ch 9: Embedded Operating Systems: The Hidden Threat
PDF
CNIT 125 Ch 4. Security Engineering (Part 1)
PPTX
Essential Layers of IBM i Security: File and Field Security
PDF
CNIT 123: Ch 7: Programming for Security Professionals
PDF
Enterprise Security in Mainframe-Connected Environments
Security 101: Controlling Access to IBM i Systems and Data
Taking Control of Access to Your IBM i Systems and Data
CNIT 123: Ch 9: Embedded Operating Systems: The Hidden Threat
Ch 9: Embedded Operating Systems: The Hidden Threat
CNIT 125 Ch 4. Security Engineering (Part 1)
Essential Layers of IBM i Security: File and Field Security
CNIT 123: Ch 7: Programming for Security Professionals
Enterprise Security in Mainframe-Connected Environments

What's hot (20)

PPTX
CISSP - Chapter 3 - CPU Architecture
PPTX
Essential Layers of IBM i Security: System-Access Security
PDF
CNIT 123: Ch 13: Network Protection Systems
PDF
CNIT 123: 8: Desktop and Server OS Vulnerabilites
PPTX
IBM i Security SIEM Integration
PDF
Controlling Access to IBM i Systems and Data
PPTX
Essential Layers of IBM i Security: Security Monitoring and Auditing
PDF
7. Security Operations
PDF
CNIT 125: Ch 4. Security Engineering (Part 1)
PPT
Chapter 8 Presentaion
PDF
CNIT 123: Ch 4: Footprinting and Social Engineering
PPT
Security Framework for the IPv6 Era
PDF
3. Security Engineering
PDF
CISSP Prep: Ch 7. Security Assessment and Testing
PPTX
Social Distance Your IBM i from Cybersecurity Risk
PDF
CNIT 125 Ch 3. Asset Security
PPTX
IBM i Security Best Practices
PDF
The New Assure Security: Complete IBM i Compliance and Security
ODP
CISSP Week 22
PDF
Best Practices in IBM i Security
CISSP - Chapter 3 - CPU Architecture
Essential Layers of IBM i Security: System-Access Security
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: 8: Desktop and Server OS Vulnerabilites
IBM i Security SIEM Integration
Controlling Access to IBM i Systems and Data
Essential Layers of IBM i Security: Security Monitoring and Auditing
7. Security Operations
CNIT 125: Ch 4. Security Engineering (Part 1)
Chapter 8 Presentaion
CNIT 123: Ch 4: Footprinting and Social Engineering
Security Framework for the IPv6 Era
3. Security Engineering
CISSP Prep: Ch 7. Security Assessment and Testing
Social Distance Your IBM i from Cybersecurity Risk
CNIT 125 Ch 3. Asset Security
IBM i Security Best Practices
The New Assure Security: Complete IBM i Compliance and Security
CISSP Week 22
Best Practices in IBM i Security
Ad

Similar to Security 101: Controlling Access to IBM i Systems and Data (20)

PPTX
Lock it Down: Access Control for IBM i
PDF
Expand Your Control of Access to IBM i Systems and Data
PPTX
Q4_Fortify your IBM Power Systems with Strong Access Control_E_FINAL.pptx
PPTX
What Does a Full Featured Security Strategy Look Like?
PPTX
Lannguyen-Detecting Cyber Attacks
PDF
Ch 8: Desktop and Server OS Vulnerabilites
PPTX
Exploitation techniques and fuzzing
PPT
W982 05092004
PPTX
Essential Layers of IBM i Security: IBM i Security Configuration
PPTX
Slide Deck CISSP Class Session 5
PDF
CNIT 123 8: Desktop and Server OS Vulnerabilities
PDF
CNIT 123 Ch 8: OS Vulnerabilities
PDF
CNIT 160 4e Security Program Management (Part 5)
PPTX
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
PPTX
Dncybersecurity
PPTX
Top 10 Design & Security Tips to Elevate Your SCADA System
PDF
How we breach small and medium enterprises (SMEs)
PDF
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
PPTX
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
PPTX
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Lock it Down: Access Control for IBM i
Expand Your Control of Access to IBM i Systems and Data
Q4_Fortify your IBM Power Systems with Strong Access Control_E_FINAL.pptx
What Does a Full Featured Security Strategy Look Like?
Lannguyen-Detecting Cyber Attacks
Ch 8: Desktop and Server OS Vulnerabilites
Exploitation techniques and fuzzing
W982 05092004
Essential Layers of IBM i Security: IBM i Security Configuration
Slide Deck CISSP Class Session 5
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 Ch 8: OS Vulnerabilities
CNIT 160 4e Security Program Management (Part 5)
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
Dncybersecurity
Top 10 Design & Security Tips to Elevate Your SCADA System
How we breach small and medium enterprises (SMEs)
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Ad

More from Precisely (20)

PDF
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
PDF
Unlock new opportunities with location data.pdf
PDF
Reimagining Insurance: Connected Data for Confident Decisions.pdf
PDF
Introducing Syncsort™ Storage Management.pdf
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
PDF
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
PDF
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
PDF
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
PDF
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
PDF
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
PDF
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
PDF
The 2025 Guide on What's Next for Automation.pdf
PDF
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
PDF
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
PDF
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
PDF
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
PDF
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
PDF
The Changing Compliance Landscape in 2025.pdf
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
Unlock new opportunities with location data.pdf
Reimagining Insurance: Connected Data for Confident Decisions.pdf
Introducing Syncsort™ Storage Management.pdf
Enable Enterprise-Ready Security on IBM i Systems.pdf
A Day in the Life of Location Data - Turning Where into How.pdf
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
The 2025 Guide on What's Next for Automation.pdf
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
The Changing Compliance Landscape in 2025.pdf

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
KodekX | Application Modernization Development
PDF
Machine learning based COVID-19 study performance prediction
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Modernizing your data center with Dell and AMD
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Cloud computing and distributed systems.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
MYSQL Presentation for SQL database connectivity
Advanced methodologies resolving dimensionality complications for autism neur...
Network Security Unit 5.pdf for BCA BBA.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KodekX | Application Modernization Development
Machine learning based COVID-19 study performance prediction
NewMind AI Weekly Chronicles - August'25 Week I
Mobile App Security Testing_ A Comprehensive Guide.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Chapter 3 Spatial Domain Image Processing.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Modernizing your data center with Dell and AMD
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Cloud computing and distributed systems.
Review of recent advances in non-invasive hemoglobin estimation
NewMind AI Monthly Chronicles - July 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
A Presentation on Artificial Intelligence
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
MYSQL Presentation for SQL database connectivity

Security 101: Controlling Access to IBM i Systems and Data

  • 1. Security 101: Controlling Access to IBM i Systems and Data Barry Kirksey, Senior Solutions Architect 1
  • 2. Agenda 1 – IBM i Access Vulnerabilities 2 – Exit Points and Exit Programs 3 – Four Levels of Access Control 4 – Tradeoffs: DIY or Packaged Solutions? How Syncsort Can Help5 –
  • 3. • The IBM i is increasingly connected • Prior to the 1990s, the IBM i was isolated • In the 1990s IBM opened up the system to TCP/IP • The numbers of ways the system could be accessed grew • Legacy, proprietary protocols now cohabitate with new, open- source protocols – creating access point headaches • The worldwide hacker community now recognizes the IBM i as a high-value target • 4 important levels of access must now be secured • Network access • Communication port access • Database access • Command access Why Secure Access Points? 3
  • 4. • What are exit points and exit programs? • Exit points and exit programs are powerful tools for access control • Introduced in 1994 to the AS/400 in V3R1 of the operating system • Exit points provide “hooks” to invoke one or more user-written programs—called exit programs—for a variety of OS-related operations • Exit programs are registered to particular exit points • How can exit points be used? • Exit programs can allow or deny access based on parameters such as permissions, date/time, user profile settings, IP addresses, etc. • Command exit points can allow or deny command execution based on context and parameters • Exit programs can also trigger actions such as logging access attempts, disabling user profiles, sending an alert, etc. 4 Exit Points and Exit Programs
  • 5. Securing Network Access Security Challenges • Network protocols make it possible for users to connect directly to backend databases on the IBM i • Network protocols include FTP, ODBC, JDBC, DDM, DRDA, NetServer and others • Without proper controls, the system is open to hackers or internal users who may create problems • Without network controls, it is also possible to remotely execute commands (e.g. RCMD or REXEC) via FTP, ODBC and RMTCMD functions • SQL statements could also be remotely executed via ODBC, JDBC and DRDA if not locked down How Exit Points Can Help • IBM i provides dozens of exit points that cover most network access protocols • Exit programs can be created and assigned to these exit points • Exit programs can control access by a variety of criteria and monitor and log activity • When access is controlled through network exit programs, only the specific operations defined by the exit program can occur • Application Administration provides a partial solution that can control which users can access particular network functions, but does not provide logging and cannot be controlled via granular rules 5
  • 6. Securing Com Port Access Security Challenges • Some network protocols don’t have their own exit points and can’t be protected in the same way • These network protocols include SSH, SFTP, SMTP and others • IT teams may also wish to control communication access in a way network or other types of exit points cannot (for example, specifying a port number) How Exit Points Can Help • IBM provides socket exit points • Socket exit programs secure connections by specific port and/or IP addresses • Socket exit programs have limits; e.g. fewer parameters are available to control inbound connection • Socket exit points paired with the other types of exit point access control methods provide stronger protection 6
  • 7. Securing Database Access Security Challenges • Object-level security only goes so far in controlling access to sensitive data • Open-source protocols that access data create particular vulnerabilities • Open-source protocols include JSON, Node.js, Python, Ruby and others • Open-source protocols don’t have their own exit points • Without properly securing database access, data could be viewed or changed without proper authorization or even stolen How Exit Points Can Help • A powerful exit point called Open Database File allows exit programs that protect data from any kind of access • The exit program can be invoked whenever a physical file, logical file, SQL table or SQL view is opened • The exit program can contain a granular set of rules that control under what conditions the file can be accessed and by whom • The exit program can also be defined to audit all activity 7
  • 8. Securing Command Access Security Challenges • The incorrect use of commands by users can cause considerable damage (deleting files, ending processes, or worse) • Access to commands can be controlled to some extent through user profiles and object-level security • A more refined approach to command control is often required – especially for powerful profiles How Exit Points Can Help • IBM i provides exit points that cover the use of commands • Exit programs can be developed to allow or disallow access to any command within very specific circumstances • Command control can be performed regardless of whether it is performed within the IBM i or through network access • Command exit programs supersede normal object-level security to provide an additional, very useful layer of security for users with powerful authorities 8
  • 9. Tradeoffs Do-It-Yourself In-House • Resources may be stretched and pulled off project • May need to bring in consultants or hire new employee because of lack of knowledge • Need to stay on top of new PTFs or updates to the OS • Knowledgeable resource may leave or retire Third-Party Solutions • Frees up your resources for more important projects • Provides separation of duties • Leverages experts in the field • Vendor is in the business of releasing updated software • Vendors ensure exit programs stay current to the latest threats and OS capabilities • Ensures optimal performance of exit programs 9
  • 11. Data Privacy Protect the privacy of data at-rest or in-motion to prevent data breaches Access Control Ensure comprehensive control of unauthorized access and the ability to trace any activity, suspicious or otherwise Compliance Monitoring Gain visibility into all security activity on your IBM i and optionally feed it to an enterprise console Security Risk Assessment Assess your security threats and vulnerabilities 11 Syncsort can address the issues on the radar screen of every security officer and IBM i admin
  • 12. Assure System Access Manager Comprehensive control of external and internal access • Network access (FTP, ODBC, JDBC, OLE DB, DDM, DRDA, NetServer, etc.) • Communication port access (using ports, IP addresses, sockets - covers SSH, SFTP, SMTP, etc.) • Database access (open-source protocols - JSON, Node.js, Python, Ruby, etc.) • Command access Powerful, flexible and easy to manage • Easy to use graphical interface • Standard configuration easy deployment • Powerful, flexible rules for controlling access based on conditions such as date/time, user profile settings, IP addresses, etc. • Simulation mode for rules testing • Provides alerts and produces reports • Logs access data for SIEM integration Secures IBM i systems and enables regulatory compliance • Supports regulatory requirements for SOX, GDPR, PCI-DSS, HIPAA, and others • Satisfies security officers by securing access to IBM i systems and data • Significantly reduces the time and cost of achieving regulatory compliance • Enables implementation of security best practices • Quickly detects security incidents so you can efficiently remediate them • Has low impact on system performance 12
  • 13. Expert services are available for • Security risk assessment • Quick start services • Quick check services • Security update services (hot fixes, PTFs, new releases, etc.) • System update services (ensuring security solution is properly configured after system changes to IP addresses, OS versions, etc.) • Auditor assist (supporting internal or external auditors) • Managed security services • A la carte consulting Leverage the seasoned security experts in Syncsort Global Services! The Syncsort Services Team Is Here for You 13