Hi,
I am looking for some recommendation from IBM on the percentage of users in each user class for iSeries server.
For example, there should not be 10% of users QSECOFR
Also, for percentage of users for :
1. Special authority,
2. Powerful Users with default password
3. Password same as User profile value
4. IBM Pwd same as User Profile value
5. User profile with no PWD
6. Disabled profiles
Can someone plese provide information or link for IBM documentation.
Thanks and Regards,
Deepika Rohilla
I'm not aware any direct IBM recommendations, nor can I think of a good way for them to create any. The extreme range of small-to-large systems along with the variety of workloads would make any numerical recommendations meaningless. Recommendations must also take into account the structures of all applications, which is well outside of IBM knowledge.
You might start with downloading the 2012 State of IBM i Security Study white paper from PwerTech. That can give you a beginning picture of what is common in companies that are looking to improve their systems' security. In addition, you might request a Compliance Assessment: Evaluate Your System Security from PowerTech to see a direct evaluation of your systems security state. Finally, consider downloading the Open Source Security Policy from PowerTech. You might use it to begin documenting your own security policy.
I know all of those are from the same company, but I worked for PowerTech until leaving recently for other interests. I don't (yet) know what's available elsewhere, and all of those are free (well, for the cost of a basic questionnaire.) I don't know of anything better without hiring someone for services or talking with sales people.
Tom
I have no idea what happened to the remaining 95% of my last comment. It's disturbing that there is no 'Preview' available so that everything can be lost by clicking {Add...}. Nor can you edit comments. (Nor can you use Firefox for practical entry of comments.)
My first comment took hours to show up in the thread after it appeared under the "IT Discussions" tab on the main ITKE page. Maybe the rest of the previous comment will arrive here tomorrow.
Tom
Thanks Tom and Charlie.
We understand from the business perspective that what we should allow here following the security standards those have been setuo by the company, but just wanted to ensure and be in sync with any recommendations from IBM.
Regards,
Deepika Rohilla
Free Guide: Managing storage for virtual environments
Complete a brief survey to get a complimentary 70-page whitepaper featuring the best methods and solutions for your virtual environment, as well as hypervisor-specific management advice from TechTarget experts. Don’t miss out on this exclusive content!
Discuss This Question: 4  Replies