PowerTech, a division of Help/Systems, announces the release of the 2013 "State of IBM i Security Study."
The 2013 findings show that IBM i user provisioning is a significant source of vulnerability, with averages that include:
- 79 users had default passwords—50 percent of which are enabled for use
- 197 enabled users had command line permissions
- 31 servers didn't require users to change passwords
- 9 servers permitted an unlimited number of sign-on attempts
"Every year I expect the results to improve," explained Robin Tatam, PowerTech Director of Security Technologies and the study's author. "But 10 years after the first release, we are still finding vulnerabilities from poor profile management and little to no IBM i network security."
In addition to IBM i user provisioning errors, the study also found that 79 percent of servers don't monitor network access, which means that anyone with an enabled user profile can directly access business-critical data via interfaces such as FTP and ODBC without authorization.
The 2013 findings were compiled from over 100 Compliance Assessment audits on IBM i servers of varying sizes and across multiple industries, including financial, retail, and manufacturing.
"It's critical to recognize that security for the server does not come preconfigured," said Tatam. "IBM i remains one of the most securable platforms, but this 'load-and-go' perception puts organizations at risk for data loss, fraud, or worse."
Tatam emphasized that the weaknesses identified in the study can—and should be—corrected with proper configuration settings, administration, and an IBM i security policy.
LATEST COMMENTS
MC Press Online