IBM recommendation for percentage of users in each user class for iSeries

115 pts.
Tags:
as400 userprf
Hi, I am looking for some recommendation from IBM on the percentage of users in each user class for iSeries server. For example, there should not be 10% of users QSECOFR Also, for percentage of users for : 1. Special authority, 2. Powerful Users with default password 3. Password same as User profile value 4. IBM Pwd same as User Profile value 5. User profile with no PWD 6. Disabled profiles Can someone plese provide information or link for IBM documentation. Thanks and Regards, Deepika Rohilla

Software/Hardware used:
AS400

Answer Wiki

Thanks. We'll let you know when a new response is added.

For these items, I would say 0%

2. Powerful Users with default password
3. Password same as User profile value
4. IBM Pwd same as User Profile value

Discuss This Question: 4  Replies

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • TomLiotta
    I'm not aware any direct IBM recommendations, nor can I think of a good way for them to create any. The extreme range of small-to-large systems along with the variety of workloads would make any numerical recommendations meaningless. Recommendations must also take into account the structures of all applications, which is well outside of IBM knowledge.   You might start with downloading the 2012 State of IBM i Security Study white paper from PwerTech. That can give you a beginning picture of what is common in companies that are looking to improve their systems' security. In addition, you might request a Compliance Assessment: Evaluate Your System Security from PowerTech to see a direct evaluation of your systems security state. Finally, consider downloading the Open Source Security Policy from PowerTech. You might use it to begin documenting your own security policy.   I know all of those are from the same company, but I worked for PowerTech until leaving recently for other interests. I don't (yet) know what's available elsewhere, and all of those are free (well, for the cost of a basic questionnaire.) I don't know of anything better without hiring someone for services or talking with sales people.   Tom
    125,585 pointsBadges:
    report
  • TomLiotta
    I agree with CharlieBrowne's
    125,585 pointsBadges:
    report
  • TomLiotta
    I have no idea what happened to the remaining 95% of my last comment. It's disturbing that there is no 'Preview' available so that everything can be lost by clicking {Add...}. Nor can you edit comments. (Nor can you use Firefox for practical entry of comments.)   My first comment took hours to show up in the thread after it appeared under the "IT Discussions" tab on the main ITKE page. Maybe the rest of the previous comment will arrive here tomorrow.   Tom
    125,585 pointsBadges:
    report
  • DeepikaR
    Thanks Tom and Charlie. We understand from the business perspective that what we should allow here following the security standards those have been setuo by the company, but just wanted to ensure and be in sync with any recommendations from IBM. Regards, Deepika Rohilla
    115 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following