Cybersecurity checkup: Protect your IBM i

Did you know that reports of cyberattacks have roughly quadrupled since the pandemic began? Because of COVID-19 and other world events, many people have been required to work from home without the protective IT bubble provided in our office spaces, inadvertently putting organizations at greater cybersecurity risk. October is National Cybersecurity Awareness Month (NCSAM), and it’s a great reminder and opportunity to think about ways you can reduce risk and better protect your IT environment. In this post, we’ll look at how you can #BeCyberSmart with your IBM i systems.

If you connect it, protect it

The first theme of NCSAM covers protecting the assets you connect to your network. For IBM i clients, many users still access the system through Telnet (green screen). And we’ve gotten good at restricting access using menus and the applications we’ve written over the years. But when you have a user profile on IBM i, you’re allowed access to all system interfaces. This includes bulk transfer interfaces like File Transfer Protocol (FTP), Open Database Connectivity (ODBC) and Microsoft Excel. And sadly, the databases beneath your applications are often not secured properly.

One of the best ways you can protect your IBM i is by limiting which interfaces users are allowed to access on your system. IBM i makes this very easy using exit points. Exit points are hooks built into the operating system that allow further security when connections are made. You attach programs to these exit points that can then review a connection before it is allowed to proceed. This stops unauthorized data access before your valuable data escapes the system. You can write your own exit point programs, purchase them from IBM Systems Lab Services or purchase them from an IBM i Security Business Partner.

Securing devices at home and work

When we work out of our homes and other new locations, we lose some of the protections provided on a corporate network. Some people are even placing their IBM i’s directly on the public internet for remote access. Keep in mind, when you use protocols such as Telnet or FTP, the entire transaction happens in the clear. This means that anyone between you and your IBM i can see your user profile, your password and any data you send back and forth with the system.

However, there’s a simple solution to secure your connections: Transport Layer Security (TLS). The same security technology you use to secure your web browsing and shopping can be used for almost every interface on your IBM i. Using the Digital Certificate Manager (DCM), you can create, sign and apply certificates to the services (interfaces) on your IBM i. And this gives you a chance to explore the all-new DCM web interface.

Securing internet-connected devices in healthcare

Many hospitals and other medical providers use IBM i to power their business. According to the Administrative Safeguards provisions in the HIPPA Security Rule, covered entities are required to perform risk analysis as part of their security management processes. IBM Systems Lab Services provides IBM i Security Assessments. These assessments show you where the risks are in your environment. Once the assessment is complete, we can help guide you in taking corrective actions to reduce the risk in your IBM i. CIS Benchmarks also now include IBM i in their very popular security hardening guidelines. You can find them at

The future of connected devices

Looking into the future of security on IBM i, we see new ways of authenticating users. One advanced method of authentication is to use Kerberos-based Single Sign On (SSO). This ties your IBM i to your Active Directory, eliminating the need for passwords on your IBM i. Another new authentication technology for IBM i is multifactor authentication (MFA). Both solutions take skills to set up and get operational with as little manual effort as possible. Our team is available to discuss these options with you and find the best fit for your enterprise.

Where to find help

The IBM Systems Lab Services IBM i security team is here to help keep you and your IBM i safe in this new normal. We can help assess your systems, reduce risk, educate your IT staff and provide software to make your IBM i run smoothly and safely.

>> To learn more, visit our website or contact us.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

error: Content is protected !!
This website uses cookies and asks your personal data to enhance your browsing experience.
× Chat with us on WhatsApp