云题海 - 专业文章范例文档资料分享平台

当前位置:首页 > IBM AS400 Security Procedures

IBM AS400 Security Procedures

  • 62 次阅读
  • 3 次下载
  • 2025/5/25 21:31:12

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

K.2 System Security Values - Cont'd

K.2.1.1 Determine who is/are assigned the QSECOFR profile.

All system inquiries in this section must be made with the QSECOFR profile as any others won't have enough privilege. The person holding the QSECOFR profile is typically the master security officer or someone of high management level.

K.2.1.2 Review other duties performed by the Master Security Officer (MSO) to

ensure they do not conflict with the responsibilities required by the MSO position (e.g. if the MSO is a programmer).

K.2.2 System values are defined by the client. Obtain the system values report

which lists all system values together with a brief description of each value by entering the following command:

WRKSYSVAL

The system values can also be displayed one by one on the terminal by using this command:

DSPSYSVAL SYSVAL (system value)

To print one by one use the command:

WRKSYSVAL *SEC OUTPUT(*PRINT)

System values are defined by the client according to their specific and unique security requirements. Security could be compromised if options are changed or inappropriate.

All possible options of each system value are listed and explained in this audit program as a guide. IBM default values are underscored.

SYSTEM SECURITY K/PROG

20

Page 2 of 22

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

K.2 System Security Values - Cont'd

K.2.2.1 Determine the system security level:

QSECURITY

10: No user authentication, no resource protection.

20: User authentication through password security only, no resource

protection.

30: User authentication and default resource protection.

40: Similar to level 30 but controls privileged instructions and the

machine interface.

E&Y recommended value: 30.

Level 40 should be considered for clients with high inherent risk. It prevents direct access to objects, data of other jobs and internal system programs.

K.2.2.2 Determine the maximum number of sign-on attempts allowed:

QMAXSIGN

NOMAX: the system allows an unlimited number of sign-on attempts.

15: a user can try to sign on a maximum of 15 times.

After the specified maximum number of invalid sign-on attempts is reached, the terminal is varied (forced) off and a message is logged.

E&Y recommended value: maximum of 3.

SYSTEM SECURITY K/PROG

21

Page 3 of 22

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

K.2 System Security Values - Cont'd

K.2.2.3 Determine action taken by system when QMAXSIGN is exceeded:

QMAXSGNACN

1: disable terminal.

2: disable user profile.

3: disable terminal and user profile.

E&Y recommended value: 3.

K.2.2.4 Determine the user-selected options related to password security:

? QPWDEXPITV - password expiration interval

*NOMAX: unlimited number of days.

1-366: valid range of days.

E&Y recommended value: 30-90 days.

? QPWDRQDDIF - duplicate password control.

0: can be identical as the previous 32 passwords.

1: must be different from the previous 32 passwords.

E&Y recommended value: 1.

? QPWDMINLEN - minimum password length

1: minimum of 1 character.

1 - 10: valid range of number of characters.

E&Y recommended value: 6 or more.

SYSTEM SECURITY

22

K/PROG Page 4 of 22

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

K.2 System Security Values - Cont'd

? QPWDMAXLEN - maximum password length.

10: Maximum of 10 characters.

1 - 10: Valid range of number of characters.

E&Y recommended value: 7-8 if connecting to systems other than AS/400 or S/38.

? QPWDVLDPGM - password validation program.

*NONE: no password validation program is used.

Review specified program(password exit routine) used, if any, and ensure that it does not allow user to bypass password security and does not contain hard-coded passwords.

K.2.2.5 Determine if users with all object (*ALLOBJ) or service (*SERVICE)

special authorities may sign on to only work stations they have specific authority to access.

QLMTSECOFR - limit security officer device access.

0: allows all users with *ALLOBJ authority to sign on to any display

station, and users with *SERVICE can sign on to any display station with public authority of *CHANGE.

1: not allow users with *ALLOBJ or *SERVICE authorities to sign on any

work stations unless they have specific authority to access.

E&Y recommended value: 1.

SYSTEM SECURITY K/PROG

23

Page 5 of 22

搜索更多关于: IBM AS400 Security Procedures 的文档
  • 收藏
  • 违规举报
  • 版权认领
下载文档10.00 元 加入VIP免费下载
推荐下载
本文作者:...

共分享92篇相关文档

文档简介:

Auditor(s) Assigned Audit Date Workpaper Audit Objectives and Procedures Ref. By _______________________________________________________________________________________

× 游客快捷下载通道(下载后可以自由复制和排版)
单篇付费下载
限时特价:10 元/份 原价:20元
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信:fanwen365 QQ:370150219
Copyright © 云题海 All Rights Reserved. 苏ICP备16052595号-3 网站地图 客服QQ:370150219 邮箱:370150219@qq.com