PT Ibmi Security Policy Guide
PT Ibmi Security Policy Guide
• Back up the entire system, including the operating system and software
utilities, quarterly.
• Back up journal receivers in such a way that you have a full year of journal
information that can be retrieved and restored easily.
Fortra.com
Fortra Guide IBM i Security Standard
• Do not replicate production data to any test –Set the User Class to “User,” (USR CLS(*USER)).
environment without cleaning and scrambling sensitive –The Initial Program must be a program name and
data. Sensitive data is defined as PII and confidential a library name (not “*LIBL”) that restricts the user to
company information. only the business applications they need for their job:
a system or removed from the premises without –Set the Initial Menu to “Signoff,” (INLM NU(*SIGNOFF)).
authorization.
–Set the Limit capabilities parameter to “Yes,”
• Sign-on security: Modify the default sign-on display for (LMTCPB(*YES)).
an IBM i Telnet session as follows:
–Set the Special Authority parameter to “None,”
–Remove the Menu, Program, and Library fields from the (SPCAUT(*NONE)).
default 5250 sign on.
authorization. –Set the Initial Menu to either the IBM i Main Menu
(INLMNU(MAIN)), or to another appropriate menu.
Fortra.com Page 2
Fortra Guide IBM i Security Standard
• 4.4 – Application Programmer User Profile Parameters –Users whose profiles have any IBM i special authorities
(*ALLOBJ, *SECADM, and so forth) must have
Set the user profile parameters for an application
specific management authorization to those special
programmer as follows:
authorities.
–Set the User Class to “Programmer,” (USRCLS(*PGMR)).
–Limit the use of profiles with IBM i special authorities
–Set the initial menu to either the IBM i Main Menu
to operational need. During the times that a special
(INLMNU(MAIN)), or to another appropriate menu.
authority is not required, the user should not have it
–Set the Limit capabilities parameter to “Partial,” assigned to their active profile. Elevated privileges can
(LMTCPB(*PARTIAL)). be provided by elevating to a more privileged account
via Powertech Authority Broker.
–Set the Special Authority parameter to “Job Control,”
(SPCAUT(*JOBCTL)). –Users with *ALLOBJ and/or *SECADM special authority
must have *CMD auditing CHGUSRAUD USRPRF(XXX)
–Any application programmers that need more special
authorities should receive those on a temporary, as- AUDLVL(*CMD) configured.
needed basis.
–Produce a log of activity for each session of a powerful
user and review it.
Set the User Profile parameters for a system • 4.7 – Group Profiles
administrator as follows:
–Configure group profiles with the following attributes:
–Set the User Class to “Security Officer,”
• SPCAUT(*NONE) – where possible
(USRCLS(*SECOFR)).
• PASSWORD(*NONE)
–Set the Initial Menu to either the IBM i Main Menu
• PWDEXPITV(*SYSVAL)
(INLMNU(MAIN)), or to another appropriate menu.
• STATUS(*DISABLED)
–Set the Limit capabilities parameter to “No,”
(LMTCPB(*NO)). • LMTCPB(*YES)
• INLPGM(*NONE)
”The integrity of any operating system depends not only on the existence of
robust security controls but also on the correct configuration of those controls.
Risk is elevated whenever either of those elements is lacking..“
Fortra.com Page 3
Fortra Guide IBM i Security Standard
• 4.8 – IBM-Supplied User Profiles –Do not use vendor-supplied user profiles as a group
profile, especially if the vendor-supplied profile owns
–Do not use IBM profiles as a group profile for any user.
application objects.
–IBM profiles must not own any objects created by users
on the system.
• 4.11 – Passwords
Exception: The QSECOFR profile must be the owner of all
–Keep passwords secret and do not share them with
other user profiles.
others.
–No user should be granted a private authority to any
–No IT person should ever ask a user to reveal their
IBM-supplied user profile.
password.
–The following IBM-supplied user profiles must have a
–No user should ever disclose their password to another
password of *NONE. They should be given a password
user for any reason.
only for authorized use of the profile:
–No user profile should ever have a default password,
either where the password is equal to the User ID name,
QSYSOPR QPGMR QUSER QSRV or the password is set to a published or known value.
QMGM QMQMADM QNETSPLF QNETWARE –User provisioning should set initial pass words. These
passwords should be generated randomly and the
QNFSANON QRJE QTCM QTIVOLI user should be required to change the password on
first use. Set PW- DEXP to *YES.
QTIVROOT QTIVUSER QTMHHTP1 QTMHTTP
–See the System configuration section of this document
QTMPLPD QUMB QUSER for the system value settings that control the password
composition rules.
–Have a defined process for managing (who can use –Change passwords at least every 90 days.
and change the password for) the QSECOFR user
• QPWDEXPITV(90)
profile.
–A new password should be different from the last 10 of
–See Appendix A for a list of the people who have
the user’s passwords.
the authority to use, or grant use to, the QSECOFR
–When a profile is initially provisioned or if the Help Desk
password.
or other facility changes a user’s password, it should
–Avoid using the QSECOFR profile. QSECOFR should only
be configured to require that it be changed on first use.
be used to upgrade the operating system—not for
everyday use. In nearly every situation, a copy of the
QSECOFR profile with the same IBM i special authorities • 4.13 – Inactive Users
will satisfy the organization’s needs. –Disable all users that have not logged on to the system
in the last 60 days.
• 4.10 – Non-IBM-Supplied User Profiles
–Delete all users that have not logged on to the system
–User profiles supplied or created by other vendors must in the last 120 days.
have a password of *NONE.
–When a user is deleted, assign any objects owned by
If a password is required, set it to be a strong that user to the user’s group profile or a profile created
password—not a default. to own these objects
Fortra.com Page 4
Fortra Guide IBM i Security Standard
QALWOBJRST *NONE
QAUDENDACN *NOTIFY
QAUDFRCLVL *SYS
QAUTOCFG 0
QAUTORMT 0
QAUTOVRT 100
QCRTOBJAUD *NONE
QDEVRCYACN *DSCMSG
QDSCJOBITV 120
QFRCCVNRST 3
QINACTITV 15 (Note: if this value cannot be set, set a policy at the network to time-out the
workstation.)
QINACTMSGQ *DSCJOB
QMAXSGNACN 2 or 3
QMAXSIGN 5
QPWDLVL 3
Fortra.com Page 5
Fortra Guide IBM i Security Standard
QPWDRULES *MINLEN8
*MAXLEN128
*DGTMIN1
*LMTPRFNAME
*REQANY3
*ALLCRTCHG (V7R2 and later
QPWDRQDDIF 5
QPWDVLDPGM *NONE
QRETSVRSEC 1
QRMTIPL 0
QRMTSIGN *VERIFY
QRMTSRVATR No recommendation
QSECURITY 40
QSHRMEMCTL 1
QSSL* Configured to allow *TLS12 and *TLS1.3 and the strongest ciphers supported by the
release
QVFYOBJRST 3 or 5
Fortra.com Page 6
Fortra Guide IBM i Security Standard
DDMACC
Use Powertech Exit Point Manager
JOBACN
*REJECT (unless still using SNADS)
PCSACC
*REGFAC
• Install and configure Powertech Exit Point Manager to • Root, QOpenSys, and /QSYS.LIB cannot be shared
log and control access through network access such
• Regularly scan the IFS for malware using Powertech
as FTP and ODBC.
Antivirus
–Programs, service programs • Retain Audit Journal receivers for at least 12 months.
–Display files • Set the QAUDLVL system values according to the System
–Message files Configuration section in this document.
• The following may need to be *PUBLIC *CHANGE • Turn on User Auditing for every powerful user on the
system.
–Libraries where temporary objects are being created
(e.g., queries)
–OUTQs, MSGQs
–DEVDs
Fortra.com Page 7
Fortra Guide IBM i Security Standard
• Virus protection
• Encryption
– Backup tapes
– Transmitted data
• PTF-level policy
APPENDIX A
• The QSECOFR Profile
Fortra.com Page 8
Fortra Guide IBM i Security Standard
License Agreement
This Fortra Security Standard is provided to you free of charge, but is still protected by copyright law. Your use of this policy is
subject to the terms and conditions below:
1. Give us credit! You may copy and distribute this policy, provided you conspicuously publish a copyright notice (© 2024 Fortra)
and always include the disclaimer of warranty and the part where we warn you that we’re not going to be liable for the
consequences of anyone using the recommendations in this policy (it keeps us out of hot water). You have to include a
complete copy of this license and the warranty disclaimer in any copy you distribute to anybody else. One more thing—we
provided this policy to you free of charge, so you can’t charge other people for access to and/or use of this policy.
2. You may modify any portion of the policy and distribute this new version, as long as you don’t violate the terms of Section 1
and you agree to all of these conditions we’re about to lay out:
• If you change the policy, you have to take credit for (or own up to) your changes with a prominent notice stating what
changed and when.
• If you distribute or publish any part of this policy, or you derive a new policy from it, you have to license the new work(s) for
free too. No matter who you send it to, you can’t charge them a fee for the policy.
• Pay attention to this part because it’s real important: If you change the policy, you have to send a copy of your modifications
to Fortra at [email protected] and you grant Fortra a worldwide, royalty-free irrevocable, perpetual license to use, modify, and
distribute your modifications as part of the policy. We’ll have a look at your submission and decide if we want to include it
in a future release of the policy. No, we’re not going to pay you for it, but yes we will give you named credit as a contributor
(unless you ask us to keep your identity anonymous). Isn’t that what Open Source is all about?
3. You don’t have to accept this license—you haven’t signed anything. It doesn’t even affect you if you’re just reading the policy.
However, nothing else grants you permission to copy, distribute or modify the policy. By definition if you copy, distribute,
modify, or derive works from the policy, you have accepted the license and all of its terms.
4. This policy is licensed free of charge, so there is no warranty, expressed or implied. If you are considering using this policy, we
assume you’re an experienced IBM i professional and are intelligent enough to test any potential impacts of the policy before
you implement any recommendations. You must make up your own mind as to whether the recommendations in this policy
are right for your systems. If you use this policy or its recommendations, you agree that Fortra is not liable for any problems or
damage you may do to your system. If you can’t accept these conditions, don’t use the policy.
About Fortra
Fortra is a cybersecurity company like no other. We’re creating a simpler, stronger future for our
customers. Our trusted experts and portfolio of integrated, scalable solutions bring balance and
control to organizations around the world. We’re the positive changemakers and your relentless ally to
Fortra.com
provide peace of mind through every step of your cybersecurity journey. Learn more at fortra.com.
© Fortra, LLC and its group of companies. All trademarks and registered trademarks are the property of their respective owners. (fta-pt-gd-0324-r2-as)