SlideShare a Scribd company logo
IBM i Security:
Identifying the Events
that Matter Most
Making Sense of Critical Security Data
Patrick Townsend - Townsend Security
Bill Hammond - Precisely
The global leader in data integrity
Trust your data. Build your possibilities.
Our data integrity software and data enrichment products
deliver accuracy and consistency to power confident
business decisions.
Brands you trust, trust us
Data leaders partner with us
of the Fortune 100
90
Customers in more than
100
2,000
employees
customers
12,000
countries
Better decisions, better data
Data Integration
Security
High Availability
Mainframe Sort &
Optimization
Integrate
Data Discovery
Data Cleansing
Data Lineage
Governance
Verify
Spatial Analysis
Geocoding
Routing
Visualization
Locate
Location Enrichment
Boundaries
Points of Interest
Property Attributes
Demographics
Enrich
Townsend Security
ENCRYPTION KEY MANAGEMENT
4
Townsend Security creates data privacy solutions
that help organizations meet evolving compliance
requirements and mitigate the risk of data breaches
and cyber-attacks. The company’s solutions easily
integrate with Precisely’s Assure Security products.
Companies worldwide trust Townsend Security’s
NIST and FIPS 140-2 compliant solutions to meet
encryption and key management requirements in
PCI DSS, GDPR, CCPA, HIPAA/HITECH, FISMA,
and other regulatory compliance requirements.
Technology Partners Include
Today’s Agenda
• Basics of security monitoring
• Key areas to monitor
• Integration with SIEM solutions
• How Precisely can help
5
Basics of
Security Monitoring
6
Basics of Security Monitoring
You can’t monitor what you aren’t watching!
7
A strong IBM i security foundation requires solutions that draw a
perimeter around your system and its data – capturing security
data that you can monitor in log files
IBM i has powerful audit logs
• System Journal – QAUDJRN
• Database (Application) Journals – for Before and After
Images
• Other IBM Journals are available
• QHST Log Files – DSPLOG Command
• System Message Queues – QSYSOPR, QSYSMSG
Turn on auditing, save journal receivers, and take advantage of
everything the operating system can log for you
Alerts and Reporting
Full visibility into security issues!
8
Security tools generate the log entries required to create a
complete audit trail of events on your system. By leveraging that
information to generate alerts and reports, those tools will also:
• Simplify the process of analyzing complex IBM i journals
• Detect security incidents when they occur
• Quickly highlight compliance deviations
• Raise alerts and deliver reports in multiple formats
• Distribute reports via SMTP, FTP, IFS, SIEM
Enterprise-Level Visibility
Monitor IBM i security all the other platforms in your enterprise
9
Monitoring and reporting tools can forward IBM i security data to
a Security Information and Event Management (SIEM) solution to:
• Integrate IBM i security data with data from other IT platforms
• Enable advanced analysis of security data using advanced SIEM
technology for correlation, pattern matching, and threat detection
• Support information sharing and collaboration across teams
• Facilitate integration with case management and ticketing systems
Analyze IBM i Audit Logs
Tools help you extract insight from your logs
10
IBM i log files are comprehensive, unalterable, and
trusted by auditors BUT they are not easy to analyze.
Monitoring and reporting tools are needed to:
• Simplify the process of analyzing complex IBM i journals
• Filter through the massive amount of information in your logs
• Detect security incidents and raise alerts
• Quickly highlight compliance deviations
• Deliver reports in multiple formats to compliance and security
auditors, partners, customers and your management team
• Relieve your team of the burden of manual analysis
Enforcement date: January 1, 2020
• Requires organizations to comply with
CCPA if they collect data on residents
of California and have annual revenues
of $25 million, collect information on
over 50,000 people or have 50% of
annual revenue from selling/sharing
personal information
• Gives individuals the right to sue for
damages should a breach expose their
data and that data wasn’t encrypted or
otherwise made unreadable. Key
requirements include:
• Access control
• Restricted user privileges
• Sensitive data protection
• System activity logging
Regulations Require Monitoring
General Data Protection
Regulation
(GDPR)
Enforcement date: 25 May 2018
• Regulation in European Union law on data
protection and privacy for all individuals
within the European Union (EU) and the
European Economic Area (EEA)
• Applies to all organizations doing business
with EU citizens
• Aims primarily to provide protection and
control over their personal data to citizens
and residents, including
• Access control
• Sensitive data protection
• Restricted user privileges
• System activity logging
• Risk assessments
New York Dept. of Financial Services
Cybersecurity Regulation
(NYS 23 NYCRR 500)
Enforcement date: February 15, 2018
• Requires banks, insurance companies,
and other financial services institutions to
establish and maintain a cybersecurity
program designed to protect consumers
• Ensures the safety and soundness of New
York State's financial services industry.
• Requirements protect the confidentiality,
integrity and availability of information
systems, including
• Risk assessments
• Restricted user privileges
• Automatic logouts
• Antivirus
• Multi-factor authentication
• System activity logging
California Consumer
Protection Act
(CCPA)
11
Key Areas to
Monitor
Why we do log
collection and
monitoring on
IBM i?
Active
Monitoring
Catching the cybercriminals early
Forensics
Fixing the problem after a
security breach
Presentation name13
14
Data Breach
Numbers
in 2019*
*Norton LifeLock statistics - 2019 data breaches
7,600 publicly disclosed
data breaches
54% increase over 2018
8.2 billion records exposed
Active Monitoring
Stop a Data Breach Before it Happens.
• 1,093 breaches in 2016
• 40% increase over 2015, an all time high
• Billions records lost since 2005
• Less than 1% of the breaches were
discovered through log analysis
• 69% of these breaches were detectible via
log evidence
Take Away: If you are monitoring
your logs, you can detect a breach
and stop it before data is lost.
Forensics
How did it happen, how do I clean it up?
• What servers are infected?
• How many are infected?
• Where did it start?
• How does the malware actually work?
• How do I clean it up?
Take Away: If you do not have logs you can’t
answer these questions and you are almost
certain to become re-infected with malware
System Log Collection and
Monitoring
Core Principles
• Centralize log collection from ALL servers, devices and PCs
• Real time collection
• Event correlation for pattern recognition
• Real time monitoring and alerting
• Historical archives for forensics
• Query and reporting services
How to collect and monitor
system logs?
• The high volume of events from the IBM i and all other
devices, servers, and PCs makes human monitoring
IMPOSSIBLE.
• Organizations of all sizes turn to Security Information and
Event Management (SIEM) solutions to solve the problem.
Smart SIEM software can handle the log collection and
monitoring much better than us humans.
The State of Logging on
the IBM i
The state of logging on most IBM i’s is not good
• There is a ton of valuable information stored on your IBM i
• The IBM i logs are in proprietary format
• IBM i security logs are often an enclave inside the IT
organization
• No standardized syslog communications facility
• The essence of good security is externalizing the logs
• There is a requirement to remove the risk of tampering
• Compliance regulations recognize the need to watch all users
– including the most powerful users
SIEM Consoles for Correlation, Monitoring,
and Alerting
• Few of these vendors capture IBM i security
events !!!
• Those that do, admit they don’t do it well
What to Look for in a System Logging
Solution
• Creates logs that ALL SIEM consoles can
read
• Forwards important information to your
SIEM
• Uses a standardized log format
• Uses SSL/TLS encryption to secure delivery
Logging on the IBM i Today
Prioritizing IBM i Log Sources
and Collection
There are many and disparate sources of logging information:
• IBM Security Audit Journal QAUDJRN
• System history message file QHST
• System operator message queue (QSYSOPR, QSYSMSG)
• IBM exit points (SQL, Telnet, FTP, RCMD, and many more)
• Linux/Unix style logs (Apache, OpenSSH, WebSphere, Perl, PHP, etc.)
• DB2 row and column access
• User and ISV applications
SIEM Integration
What is SIEM?
Security Information and Event
Management
• Real-time analysis of security alerts
generated by applications and network
hardware
• Holistic, unified view into infrastructure,
workflow, policy compliance and log
management
• Monitor and manage user and service
privileges as well as external threat data
23
Log Collection
Log Analysis
Event Correlation
Log Forensics
IT Compliance
Application Log Monitoring
Object Access Auditing
Real-Time Alerting
User Activity Monitoring
Dashboards
Reporting
File Integrity Monitoring
System/Device Log Monitoring
Log Retention
SIEM
Enterprise Security Monitoring
• Monitoring and reporting tools can forward IBM i security
data to a Security Information and Event Management (SIEM)
solution to:
• Integrate IBM i security data with data from other IT
platforms
• Enable advanced analysis of security data using correlation,
pattern matching, and threat detection
• Sharing information across teams
• Integrate with case management and ticketing systems
Monitor IBM i security along with your other enterprise platforms
24
What Can You Detect
with a SIEM?
• Data movement – inbound/outbound FTP
• Dataset access operations
• Determine potential security threats based on unauthorized access
attempts
• Ensure only authorized users are accessing critical datasets
• Privileged/non-privileged user activity monitoring
• Unusual behavior pattern – off hours connections
• High number of invalid logon attempts
• Attack detection – intrusion, scans, floods
• Authentication anomalies – e.g. entered the building at 08:30 but
logged on from another country at 09:00
• Network Traffic Analysis – high data volumes from a device/server
• … and much more
25
How Precisely
Can Help
26
27
Assure Security
Assure
Data Privacy
Assure Encryption
Assure Secure File
Transfer
Assure Monitoring
and Reporting
Assure Db2 Data
Monitor
Assure
Access Control
Assure System Access
Manager
Assure Elevated
Authority Manager
Assure Multi-Factor
Authentication
Security Risk
Assessment
Assure Compliance
Monitoring
Assure Monitoring and
Reporting monitors IBM i
system and database activity
and produces clear, concise
alerts and reports that
identify compliance
deviations and security
incidents
Assure Monitoring & Reporting
Comprehensive monitoring of system and database activity
28
• Serves as a powerful query engine with extensive filtering
• Includes out-of-the-box, customizable models for ERP applications or GDPR compliance
• Provides security and compliance event alerts via e-mail popup or syslog
• Produces clear, easy-to-read reports continuously, on a schedule or on-demand
• Supports multiple report formats including PDF, XLS, CSV and PF formats
• Distributes reports via SMTP, FTP or the IFS
• Forwards security data to Security Information and Event Management (SIEM) consoles such as IBM
QRadar, ArcSight, LogRhythm, LogPoint, and Netwrix
• No application modifications required
............SOURCES...............
Assure System Access
Manager
Exit Point Control
Assure Monitoring
and Reporting
System and Database
Activity
and Static Data Sources
Assure Elevated Authority
Manager
Privileged Access
Management
Assure Multi-Factor
Authentication
Reinforced Login
Management
Filters the
events
Selects the
message format:
*LEEF, *CEF,
*RFC3164, *RFC5424,
user-defined
Builds the
message
Categorizes
the message
Sends Syslog, Db2
file, stream file
Secures & encrypts
SSL/TLS
Enriches the
message
Optimizes
Connects to the
different sources
HPE ArcSight
Splunk
LogRhythm
MacAfee
AlienVault
SolarWinds
Etc…
SIEM
DSM
Event
Properties
Heartbeat
Assure
Security
Gateway
29
Assure Security and SIEM Integration
Benefits of
Assure Monitoring and Reporting
30
• Simplifies the process of analyzing complex journals
• Comprehensively monitors system and database activity
• Enables quick identification of security incidents and compliance
deviations when they occur
• Monitors the security best practices you have implemented
• Enables you to meet regulatory requirements for GDPR, SOX, PCI
DSS, HIPAA and others
• Satisfies requirements for a journal-based audit trail
• Provides real segregation of duties and enforces the independence of
auditors
Sample Reports
These are just a handful of the reports you could create with
Assure Monitoring and Reporting
31
• File accesses outside business hours
• Accesses to sensitive database fields
• Changes of more than 10% to a credit limit field
• All accesses from a specific IP address
• Command line activity for powerful users (*ALLOBJ, *SECADM)
• Changes to system values, user profiles, and authorization lists
• Attempts to sign into a specific account
• Actions on a sensitive spool file, such as display or deletion of the
payroll spool file
Q & A
Presentation name32
IBM i Security: Identifying the Events That Matter Most

More Related Content

What's hot (20)

PDF
Information Security Management 101
Jerod Brennen
 
PPTX
What is SIEM
Patten John
 
PPTX
Vendor Landscape: Security Information and Event Management
Info-Tech Research Group
 
PPT
Meletis BelsisManaging and enforcing information security
Meletis Belsis MPhil/MRes/BSc
 
PPTX
Siem solutions R&E
Owais Ahmad
 
PDF
SIEM Architecture
Nishanth Kumar Pathi
 
DOC
SIEM
vikasraina
 
PPTX
McAfee SIEM solution
hashnees
 
PDF
LTS Secure SIEM Features
rver21
 
PPTX
Identity intelligence: Threat-aware Identity and Access Management
Prolifics
 
PDF
Security Information and Event Management
UTD Computer Security Group
 
PPTX
Security Information and Event Managemen
S Periyakaruppan CISM,ISO31000,C-EH,ITILF
 
PPTX
SIEM - Activating Defense through Response by Ankur Vats
OWASP Delhi
 
PPT
386sum08ch8 (1)
Syeda Quratul-ain
 
PPT
Chap5 2007 C I S A Review Course
Desmond Devendran
 
PDF
Modern vs. Traditional SIEM
Alert Logic
 
PPTX
CISSP Certification- Security Engineering-part1
Hamed Moghaddam
 
PPTX
SIEM (Security Information and Event Management)
Osama Ellahi
 
PPTX
GDPR & IBM i Security
Precisely
 
PPT
CompTIA Security+ Module1: Security fundamentals
Ganbayar Sukhbaatar
 
Information Security Management 101
Jerod Brennen
 
What is SIEM
Patten John
 
Vendor Landscape: Security Information and Event Management
Info-Tech Research Group
 
Meletis BelsisManaging and enforcing information security
Meletis Belsis MPhil/MRes/BSc
 
Siem solutions R&E
Owais Ahmad
 
SIEM Architecture
Nishanth Kumar Pathi
 
McAfee SIEM solution
hashnees
 
LTS Secure SIEM Features
rver21
 
Identity intelligence: Threat-aware Identity and Access Management
Prolifics
 
Security Information and Event Management
UTD Computer Security Group
 
Security Information and Event Managemen
S Periyakaruppan CISM,ISO31000,C-EH,ITILF
 
SIEM - Activating Defense through Response by Ankur Vats
OWASP Delhi
 
386sum08ch8 (1)
Syeda Quratul-ain
 
Chap5 2007 C I S A Review Course
Desmond Devendran
 
Modern vs. Traditional SIEM
Alert Logic
 
CISSP Certification- Security Engineering-part1
Hamed Moghaddam
 
SIEM (Security Information and Event Management)
Osama Ellahi
 
GDPR & IBM i Security
Precisely
 
CompTIA Security+ Module1: Security fundamentals
Ganbayar Sukhbaatar
 

Similar to IBM i Security: Identifying the Events That Matter Most (20)

PPTX
Effective Security Monitoring for IBM i: What You Need to Know
Precisely
 
PDF
Wc4
Said Wali
 
PPTX
Improve IT Security and Compliance with Mainframe Data in Splunk
Precisely
 
PPTX
IBM Security intelligence v1 - ahmed el nahas
Shwetank Jayaswal
 
PDF
Best Practices in IBM i Security
Precisely
 
PDF
UNIT -III SIEM aur baato kaise hai aap log.pdf
hefagi6193
 
PDF
SIEM evaluator guide for soc analyst
InfosecTrain
 
PPTX
3 Strategies for Data Privacy Compliance: Securing Your Sensitive Data
SolarWinds
 
PDF
It security compliance management design guide with ibm tivoli security infor...
Banking at Ho Chi Minh city
 
PDF
It security compliance management design guide with ibm tivoli security infor...
Banking at Ho Chi Minh city
 
PPTX
How US Cybersecurity Executive Order Impacts IBM i Customers
Precisely
 
PPTX
Take your SOC Beyond SIEM
Thomas Springer
 
PPTX
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
IBM Security
 
PPTX
ee it All, Secure it All: How SIEM Strengthens Your Business
Precisely
 
PPT
Ibm q radar_blind_references
Maarten Werff
 
PDF
Flash Friday: Data Quality & GDPR
Precisely
 
PDF
Compliance and Event Monitoring with PowerSC Tools for IBM i
taford
 
PDF
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
IBM Security
 
PPSX
IBM: Cognitive Security Transformation for the Enrgy Sector
FMA Summits
 
PPTX
Increase Security Observability with IBM i Machine Data
Precisely
 
Effective Security Monitoring for IBM i: What You Need to Know
Precisely
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Precisely
 
IBM Security intelligence v1 - ahmed el nahas
Shwetank Jayaswal
 
Best Practices in IBM i Security
Precisely
 
UNIT -III SIEM aur baato kaise hai aap log.pdf
hefagi6193
 
SIEM evaluator guide for soc analyst
InfosecTrain
 
3 Strategies for Data Privacy Compliance: Securing Your Sensitive Data
SolarWinds
 
It security compliance management design guide with ibm tivoli security infor...
Banking at Ho Chi Minh city
 
It security compliance management design guide with ibm tivoli security infor...
Banking at Ho Chi Minh city
 
How US Cybersecurity Executive Order Impacts IBM i Customers
Precisely
 
Take your SOC Beyond SIEM
Thomas Springer
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
IBM Security
 
ee it All, Secure it All: How SIEM Strengthens Your Business
Precisely
 
Ibm q radar_blind_references
Maarten Werff
 
Flash Friday: Data Quality & GDPR
Precisely
 
Compliance and Event Monitoring with PowerSC Tools for IBM i
taford
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
IBM Security
 
IBM: Cognitive Security Transformation for the Enrgy Sector
FMA Summits
 
Increase Security Observability with IBM i Machine Data
Precisely
 
Ad

More from Precisely (20)

PDF
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
Precisely
 
PDF
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
Precisely
 
PDF
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
Precisely
 
PDF
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
Precisely
 
PDF
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
Precisely
 
PDF
The 2025 Guide on What's Next for Automation.pdf
Precisely
 
PDF
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
Precisely
 
PDF
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
Precisely
 
PDF
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
Precisely
 
PDF
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
Precisely
 
PDF
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
Precisely
 
PDF
The Changing Compliance Landscape in 2025.pdf
Precisely
 
PDF
AI You Can Trust: The Critical Role of Governance and Quality.pdf
Precisely
 
PDF
Automate Studio Training: Building Scripts for SAP Fiori and GUI for HTML.pdf
Precisely
 
PDF
Unlocking the Power of Trusted Data for AI, Analytics, and Business Growth.pdf
Precisely
 
PDF
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
PDF
End-to-end process automation: Simplifying SAP master data with low-code/no-c...
Precisely
 
PDF
Optimizing Your IBM i Availability: Storage vs. Software Replication.pdf
Precisely
 
PDF
AI You Can Trust - The Role of Data Integrity in AI-Readiness.pdf
Precisely
 
PDF
Top Tips to Get Your Data AI-Ready‎ ‎ ‎‎ ‎
Precisely
 
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
Precisely
 
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
Precisely
 
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
Precisely
 
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
Precisely
 
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
Precisely
 
The 2025 Guide on What's Next for Automation.pdf
Precisely
 
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
Precisely
 
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
Precisely
 
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
Precisely
 
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
Precisely
 
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
Precisely
 
The Changing Compliance Landscape in 2025.pdf
Precisely
 
AI You Can Trust: The Critical Role of Governance and Quality.pdf
Precisely
 
Automate Studio Training: Building Scripts for SAP Fiori and GUI for HTML.pdf
Precisely
 
Unlocking the Power of Trusted Data for AI, Analytics, and Business Growth.pdf
Precisely
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
End-to-end process automation: Simplifying SAP master data with low-code/no-c...
Precisely
 
Optimizing Your IBM i Availability: Storage vs. Software Replication.pdf
Precisely
 
AI You Can Trust - The Role of Data Integrity in AI-Readiness.pdf
Precisely
 
Top Tips to Get Your Data AI-Ready‎ ‎ ‎‎ ‎
Precisely
 
Ad

Recently uploaded (20)

PDF
UiPath DevConnect 2025: Agentic Automation Community User Group Meeting
DianaGray10
 
PDF
“Computer Vision at Sea: Automated Fish Tracking for Sustainable Fishing,” a ...
Edge AI and Vision Alliance
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PDF
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
PPTX
Agentforce World Tour Toronto '25 - MCP with MuleSoft
Alexandra N. Martinez
 
PDF
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
PDF
The 2025 InfraRed Report - Redpoint Ventures
Razin Mustafiz
 
PDF
How do you fast track Agentic automation use cases discovery?
DianaGray10
 
PDF
The Rise of AI and IoT in Mobile App Tech.pdf
IMG Global Infotech
 
PDF
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PDF
Transforming Utility Networks: Large-scale Data Migrations with FME
Safe Software
 
PDF
Staying Human in a Machine- Accelerated World
Catalin Jora
 
PPTX
Agentforce World Tour Toronto '25 - Supercharge MuleSoft Development with Mod...
Alexandra N. Martinez
 
PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
PDF
NASA A Researcher’s Guide to International Space Station : Physical Sciences ...
Dr. PANKAJ DHUSSA
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
UPDF - AI PDF Editor & Converter Key Features
DealFuel
 
PDF
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
PDF
Kit-Works Team Study_20250627_한달만에만든사내서비스키링(양다윗).pdf
Wonjun Hwang
 
UiPath DevConnect 2025: Agentic Automation Community User Group Meeting
DianaGray10
 
“Computer Vision at Sea: Automated Fish Tracking for Sustainable Fishing,” a ...
Edge AI and Vision Alliance
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
Agentforce World Tour Toronto '25 - MCP with MuleSoft
Alexandra N. Martinez
 
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
The 2025 InfraRed Report - Redpoint Ventures
Razin Mustafiz
 
How do you fast track Agentic automation use cases discovery?
DianaGray10
 
The Rise of AI and IoT in Mobile App Tech.pdf
IMG Global Infotech
 
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
Transforming Utility Networks: Large-scale Data Migrations with FME
Safe Software
 
Staying Human in a Machine- Accelerated World
Catalin Jora
 
Agentforce World Tour Toronto '25 - Supercharge MuleSoft Development with Mod...
Alexandra N. Martinez
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
NASA A Researcher’s Guide to International Space Station : Physical Sciences ...
Dr. PANKAJ DHUSSA
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
UPDF - AI PDF Editor & Converter Key Features
DealFuel
 
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
Kit-Works Team Study_20250627_한달만에만든사내서비스키링(양다윗).pdf
Wonjun Hwang
 

IBM i Security: Identifying the Events That Matter Most

  • 1. IBM i Security: Identifying the Events that Matter Most Making Sense of Critical Security Data Patrick Townsend - Townsend Security Bill Hammond - Precisely
  • 2. The global leader in data integrity Trust your data. Build your possibilities. Our data integrity software and data enrichment products deliver accuracy and consistency to power confident business decisions. Brands you trust, trust us Data leaders partner with us of the Fortune 100 90 Customers in more than 100 2,000 employees customers 12,000 countries
  • 3. Better decisions, better data Data Integration Security High Availability Mainframe Sort & Optimization Integrate Data Discovery Data Cleansing Data Lineage Governance Verify Spatial Analysis Geocoding Routing Visualization Locate Location Enrichment Boundaries Points of Interest Property Attributes Demographics Enrich
  • 4. Townsend Security ENCRYPTION KEY MANAGEMENT 4 Townsend Security creates data privacy solutions that help organizations meet evolving compliance requirements and mitigate the risk of data breaches and cyber-attacks. The company’s solutions easily integrate with Precisely’s Assure Security products. Companies worldwide trust Townsend Security’s NIST and FIPS 140-2 compliant solutions to meet encryption and key management requirements in PCI DSS, GDPR, CCPA, HIPAA/HITECH, FISMA, and other regulatory compliance requirements. Technology Partners Include
  • 5. Today’s Agenda • Basics of security monitoring • Key areas to monitor • Integration with SIEM solutions • How Precisely can help 5
  • 7. Basics of Security Monitoring You can’t monitor what you aren’t watching! 7 A strong IBM i security foundation requires solutions that draw a perimeter around your system and its data – capturing security data that you can monitor in log files IBM i has powerful audit logs • System Journal – QAUDJRN • Database (Application) Journals – for Before and After Images • Other IBM Journals are available • QHST Log Files – DSPLOG Command • System Message Queues – QSYSOPR, QSYSMSG Turn on auditing, save journal receivers, and take advantage of everything the operating system can log for you
  • 8. Alerts and Reporting Full visibility into security issues! 8 Security tools generate the log entries required to create a complete audit trail of events on your system. By leveraging that information to generate alerts and reports, those tools will also: • Simplify the process of analyzing complex IBM i journals • Detect security incidents when they occur • Quickly highlight compliance deviations • Raise alerts and deliver reports in multiple formats • Distribute reports via SMTP, FTP, IFS, SIEM
  • 9. Enterprise-Level Visibility Monitor IBM i security all the other platforms in your enterprise 9 Monitoring and reporting tools can forward IBM i security data to a Security Information and Event Management (SIEM) solution to: • Integrate IBM i security data with data from other IT platforms • Enable advanced analysis of security data using advanced SIEM technology for correlation, pattern matching, and threat detection • Support information sharing and collaboration across teams • Facilitate integration with case management and ticketing systems
  • 10. Analyze IBM i Audit Logs Tools help you extract insight from your logs 10 IBM i log files are comprehensive, unalterable, and trusted by auditors BUT they are not easy to analyze. Monitoring and reporting tools are needed to: • Simplify the process of analyzing complex IBM i journals • Filter through the massive amount of information in your logs • Detect security incidents and raise alerts • Quickly highlight compliance deviations • Deliver reports in multiple formats to compliance and security auditors, partners, customers and your management team • Relieve your team of the burden of manual analysis
  • 11. Enforcement date: January 1, 2020 • Requires organizations to comply with CCPA if they collect data on residents of California and have annual revenues of $25 million, collect information on over 50,000 people or have 50% of annual revenue from selling/sharing personal information • Gives individuals the right to sue for damages should a breach expose their data and that data wasn’t encrypted or otherwise made unreadable. Key requirements include: • Access control • Restricted user privileges • Sensitive data protection • System activity logging Regulations Require Monitoring General Data Protection Regulation (GDPR) Enforcement date: 25 May 2018 • Regulation in European Union law on data protection and privacy for all individuals within the European Union (EU) and the European Economic Area (EEA) • Applies to all organizations doing business with EU citizens • Aims primarily to provide protection and control over their personal data to citizens and residents, including • Access control • Sensitive data protection • Restricted user privileges • System activity logging • Risk assessments New York Dept. of Financial Services Cybersecurity Regulation (NYS 23 NYCRR 500) Enforcement date: February 15, 2018 • Requires banks, insurance companies, and other financial services institutions to establish and maintain a cybersecurity program designed to protect consumers • Ensures the safety and soundness of New York State's financial services industry. • Requirements protect the confidentiality, integrity and availability of information systems, including • Risk assessments • Restricted user privileges • Automatic logouts • Antivirus • Multi-factor authentication • System activity logging California Consumer Protection Act (CCPA) 11
  • 13. Why we do log collection and monitoring on IBM i? Active Monitoring Catching the cybercriminals early Forensics Fixing the problem after a security breach Presentation name13
  • 14. 14 Data Breach Numbers in 2019* *Norton LifeLock statistics - 2019 data breaches 7,600 publicly disclosed data breaches 54% increase over 2018 8.2 billion records exposed
  • 15. Active Monitoring Stop a Data Breach Before it Happens. • 1,093 breaches in 2016 • 40% increase over 2015, an all time high • Billions records lost since 2005 • Less than 1% of the breaches were discovered through log analysis • 69% of these breaches were detectible via log evidence Take Away: If you are monitoring your logs, you can detect a breach and stop it before data is lost.
  • 16. Forensics How did it happen, how do I clean it up? • What servers are infected? • How many are infected? • Where did it start? • How does the malware actually work? • How do I clean it up? Take Away: If you do not have logs you can’t answer these questions and you are almost certain to become re-infected with malware
  • 17. System Log Collection and Monitoring Core Principles • Centralize log collection from ALL servers, devices and PCs • Real time collection • Event correlation for pattern recognition • Real time monitoring and alerting • Historical archives for forensics • Query and reporting services
  • 18. How to collect and monitor system logs? • The high volume of events from the IBM i and all other devices, servers, and PCs makes human monitoring IMPOSSIBLE. • Organizations of all sizes turn to Security Information and Event Management (SIEM) solutions to solve the problem. Smart SIEM software can handle the log collection and monitoring much better than us humans.
  • 19. The State of Logging on the IBM i The state of logging on most IBM i’s is not good • There is a ton of valuable information stored on your IBM i • The IBM i logs are in proprietary format • IBM i security logs are often an enclave inside the IT organization • No standardized syslog communications facility • The essence of good security is externalizing the logs • There is a requirement to remove the risk of tampering • Compliance regulations recognize the need to watch all users – including the most powerful users
  • 20. SIEM Consoles for Correlation, Monitoring, and Alerting • Few of these vendors capture IBM i security events !!! • Those that do, admit they don’t do it well What to Look for in a System Logging Solution • Creates logs that ALL SIEM consoles can read • Forwards important information to your SIEM • Uses a standardized log format • Uses SSL/TLS encryption to secure delivery Logging on the IBM i Today
  • 21. Prioritizing IBM i Log Sources and Collection There are many and disparate sources of logging information: • IBM Security Audit Journal QAUDJRN • System history message file QHST • System operator message queue (QSYSOPR, QSYSMSG) • IBM exit points (SQL, Telnet, FTP, RCMD, and many more) • Linux/Unix style logs (Apache, OpenSSH, WebSphere, Perl, PHP, etc.) • DB2 row and column access • User and ISV applications
  • 23. What is SIEM? Security Information and Event Management • Real-time analysis of security alerts generated by applications and network hardware • Holistic, unified view into infrastructure, workflow, policy compliance and log management • Monitor and manage user and service privileges as well as external threat data 23 Log Collection Log Analysis Event Correlation Log Forensics IT Compliance Application Log Monitoring Object Access Auditing Real-Time Alerting User Activity Monitoring Dashboards Reporting File Integrity Monitoring System/Device Log Monitoring Log Retention SIEM
  • 24. Enterprise Security Monitoring • Monitoring and reporting tools can forward IBM i security data to a Security Information and Event Management (SIEM) solution to: • Integrate IBM i security data with data from other IT platforms • Enable advanced analysis of security data using correlation, pattern matching, and threat detection • Sharing information across teams • Integrate with case management and ticketing systems Monitor IBM i security along with your other enterprise platforms 24
  • 25. What Can You Detect with a SIEM? • Data movement – inbound/outbound FTP • Dataset access operations • Determine potential security threats based on unauthorized access attempts • Ensure only authorized users are accessing critical datasets • Privileged/non-privileged user activity monitoring • Unusual behavior pattern – off hours connections • High number of invalid logon attempts • Attack detection – intrusion, scans, floods • Authentication anomalies – e.g. entered the building at 08:30 but logged on from another country at 09:00 • Network Traffic Analysis – high data volumes from a device/server • … and much more 25
  • 27. 27 Assure Security Assure Data Privacy Assure Encryption Assure Secure File Transfer Assure Monitoring and Reporting Assure Db2 Data Monitor Assure Access Control Assure System Access Manager Assure Elevated Authority Manager Assure Multi-Factor Authentication Security Risk Assessment Assure Compliance Monitoring Assure Monitoring and Reporting monitors IBM i system and database activity and produces clear, concise alerts and reports that identify compliance deviations and security incidents
  • 28. Assure Monitoring & Reporting Comprehensive monitoring of system and database activity 28 • Serves as a powerful query engine with extensive filtering • Includes out-of-the-box, customizable models for ERP applications or GDPR compliance • Provides security and compliance event alerts via e-mail popup or syslog • Produces clear, easy-to-read reports continuously, on a schedule or on-demand • Supports multiple report formats including PDF, XLS, CSV and PF formats • Distributes reports via SMTP, FTP or the IFS • Forwards security data to Security Information and Event Management (SIEM) consoles such as IBM QRadar, ArcSight, LogRhythm, LogPoint, and Netwrix • No application modifications required
  • 29. ............SOURCES............... Assure System Access Manager Exit Point Control Assure Monitoring and Reporting System and Database Activity and Static Data Sources Assure Elevated Authority Manager Privileged Access Management Assure Multi-Factor Authentication Reinforced Login Management Filters the events Selects the message format: *LEEF, *CEF, *RFC3164, *RFC5424, user-defined Builds the message Categorizes the message Sends Syslog, Db2 file, stream file Secures & encrypts SSL/TLS Enriches the message Optimizes Connects to the different sources HPE ArcSight Splunk LogRhythm MacAfee AlienVault SolarWinds Etc… SIEM DSM Event Properties Heartbeat Assure Security Gateway 29 Assure Security and SIEM Integration
  • 30. Benefits of Assure Monitoring and Reporting 30 • Simplifies the process of analyzing complex journals • Comprehensively monitors system and database activity • Enables quick identification of security incidents and compliance deviations when they occur • Monitors the security best practices you have implemented • Enables you to meet regulatory requirements for GDPR, SOX, PCI DSS, HIPAA and others • Satisfies requirements for a journal-based audit trail • Provides real segregation of duties and enforces the independence of auditors
  • 31. Sample Reports These are just a handful of the reports you could create with Assure Monitoring and Reporting 31 • File accesses outside business hours • Accesses to sensitive database fields • Changes of more than 10% to a credit limit field • All accesses from a specific IP address • Command line activity for powerful users (*ALLOBJ, *SECADM) • Changes to system values, user profiles, and authorization lists • Attempts to sign into a specific account • Actions on a sensitive spool file, such as display or deletion of the payroll spool file

Editor's Notes

  • #3: Bill
  • #4: Bill
  • #6: Bill
  • #8: Bill
  • #9: Bill
  • #11: Bill
  • #12: Bill GDPR – Not only for Europe, It also addresses the export of personal data outside the EU (European Union) and EEA (European Economic Area) areas. 23 NYCRR 500 - Cybersecurity Requirements for Financial Services Companies requires banks, insurance companies, and other financial services institutions regulated by the New York Department of Financial Services.
  • #14: Patrick
  • #15: Patrick
  • #16: Patrick
  • #17: Patrick
  • #18: Patrick
  • #19: Patrick
  • #20: Patrick
  • #21: Patrick
  • #22: Patrick
  • #24: Patrick SIEM technology aggregates and provides real-time analysis of security alerts using event data produced by security devices, network infrastructure components, systems, and applications. A primary function of SIEM is to analyze security event data in real-time for internal and external threat detection to prevent potential hacks and data loss. This typically includes user behavior analytics (UBA) – understanding user behavior and how it might impact security. SIEM technologies also collect, store, analyze and report on data needed for regulatory compliance to ensure that audit requirements are met as dictated.
  • #25: Patrick
  • #26: Patrick
  • #28: Bill
  • #29: Bill
  • #30: Bill
  • #31: Bill
  • #32: Bill