User Auditing/Journaling

0 pts.
Tags:
Application development
Application security
AS/400
AS/400 careers
Backup & recovery
Biometrics
CLP
Compliance
configuration
CRM
Database
DataCenter
DB2 Universal Database
Digital certificates
Disaster Recovery
Email
Encryption
IBM Marketing Sound Off
Identity & Access Management
Instant Messaging
Microsoft Exchange
patching
PC/Windows Connectivity
PEN testing
Platform Security
Policies
Printing
provisioning
Risk management
RPG
RPGLE
Secure Coding
Security
Security Program Management
Security tokens
Single sign-on
vulnerability management
Web development
I'm new to security on the AS/400 (730). We need to have a record of what program a user calls through our ERP system or what objects are changed and who changed them. I've read some on journaling but not sure if that will work for what we need. Suggestions? Thanks Mark
ASKED: February 22, 2006  9:39 AM
UPDATED: November 30, 2009  5:36 AM

Answer Wiki

Thanks. We'll let you know when a new response is added.

Mark

In full disclosure: I work for an iSeries security vendor. We have a white paper on our website that does an excellent job of explaining the basics of iSeries auditing. Go to the following link: http://tinyurl.com/rsr95

Regards,

Nick Blattner

============================================

The answer is “Yes, journaling is appropriate.”

The full answer includes audit journaling. Program calls and object changes are tracked with user and object auditing.

Don’t hesitate to post questions about either area.

Tom

Discuss This Question: 1  Reply

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Kholder
    I would start at the IBM Info Center webstie. This link is a very good start on Security auditing on the i5 (AS/400) http://publib.boulder.ibm.com/infocenter/iseries/v5r3/index.jsp?topic=/rbapk/rbapkauditing.htm Start by planning what you really want or need. SOX might have a big play in what needs to be audited. Then implement on pieces like start auditing *ALLOBJ users commands (CD). Password failures (PW). Object Restores (OR). Authority Failures (AF). Change Profile (CP). Cleanup the older audit journal receivers so your system doesn't fill up. Hope this helps you get started.
    0 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following