IBM AS400 Security Procedures(5)
Auditor(s) Assigned Audit Date
Workpaper
Audit Objectives and Procedures Ref. By
________________________________________________________________________________________________________
K.2 System Security Values - Cont'd
K.2.1.1 Determine who is/are assigned the QSECOFR profile.
All system inquiries in this section must be made with the QSECOFR profile as any others won't have enough privilege. The person holding the QSECOFR profile is typically the master security officer or someone of high management level.
K.2.1.2 Review other duties performed by the Master Security Officer (MSO) to
ensure they do not conflict with the responsibilities required by the MSO position (e.g. if the MSO is a programmer).
K.2.2 System values are defined by the client. Obtain the system values report
which lists all system values together with a brief description of each value by entering the following command:
WRKSYSVAL
The system values can also be displayed one by one on the terminal by using this command:
DSPSYSVAL SYSVAL (system value)
To print one by one use the command:
WRKSYSVAL *SEC OUTPUT(*PRINT)
System values are defined by the client according to their specific and unique security requirements. Security could be compromised if options are changed or inappropriate.
All possible options of each system value are listed and explained in this audit program as a guide. IBM default values are underscored.
SYSTEM SECURITY K/PROG
20
Page 2 of 22
Auditor(s) Assigned Audit Date
Workpaper
Audit Objectives and Procedures Ref. By
________________________________________________________________________________________________________
K.2 System Security Values - Cont'd
K.2.2.1 Determine the system security level:
QSECURITY
10: No user authentication, no resource protection.
20: User authentication through password security only, no resource
protection.
30: User authentication and default resource protection.
40: Similar to level 30 but controls privileged instructions and the
machine interface.
E&Y recommended value: 30.
Level 40 should be considered for clients with high inherent risk. It prevents direct access to objects, data of other jobs and internal system programs.
K.2.2.2 Determine the maximum number of sign-on attempts allowed:
QMAXSIGN
NOMAX: the system allows an unlimited number of sign-on attempts.
15: a user can try to sign on a maximum of 15 times.
After the specified maximum number of invalid sign-on attempts is reached, the terminal is varied (forced) off and a message is logged.
E&Y recommended value: maximum of 3.
SYSTEM SECURITY K/PROG
21
Page 3 of 22
Auditor(s) Assigned Audit Date
Workpaper
Audit Objectives and Procedures Ref. By
________________________________________________________________________________________________________
K.2 System Security Values - Cont'd
K.2.2.3 Determine action taken by system when QMAXSIGN is exceeded:
QMAXSGNACN
1: disable terminal.
2: disable user profile.
3: disable terminal and user profile.
E&Y recommended value: 3.
K.2.2.4 Determine the user-selected options related to password security:
? QPWDEXPITV - password expiration interval
*NOMAX: unlimited number of days.
1-366: valid range of days.
E&Y recommended value: 30-90 days.
? QPWDRQDDIF - duplicate password control.
0: can be identical as the previous 32 passwords.
1: must be different from the previous 32 passwords.
E&Y recommended value: 1.
? QPWDMINLEN - minimum password length
1: minimum of 1 character.
1 - 10: valid range of number of characters.
E&Y recommended value: 6 or more.
SYSTEM SECURITY
22
K/PROG Page 4 of 22
Auditor(s) Assigned Audit Date
Workpaper
Audit Objectives and Procedures Ref. By
________________________________________________________________________________________________________
K.2 System Security Values - Cont'd
? QPWDMAXLEN - maximum password length.
10: Maximum of 10 characters.
1 - 10: Valid range of number of characters.
E&Y recommended value: 7-8 if connecting to systems other than AS/400 or S/38.
? QPWDVLDPGM - password validation program.
*NONE: no password validation program is used.
Review specified program(password exit routine) …… 此处隐藏:1582字,全部文档内容请下载后查看。喜欢就下载吧 ……
相关推荐:
- [资格考试]机械振动与噪声学部分答案
- [资格考试]空调工程课后思考题部分整合版
- [资格考试]电信登高模拟试题
- [资格考试]2018年上海市徐汇区中考物理二模试卷(
- [资格考试]坐标转换及方里网的相关问题(椭球体、
- [资格考试]语文教研组活动记录表
- [资格考试]广东省2006年高应变考试试题
- [资格考试]LTE学习总结—后台操作-数据配置步骤很
- [资格考试]北京市医疗美容主诊医师和外籍整形外科
- [资格考试]中学生广播稿400字3篇
- [资格考试]CL800双模站点CDMA主分集RSSI差异过大
- [资格考试]泵与泵站考试复习题
- [资格考试]4个万能和弦搞定尤克里里即兴弹唱(入
- [资格考试]咽喉与经络的关系
- [资格考试]《云南省国家通用语言文字条例》学习心
- [资格考试]标准化第三范式
- [资格考试]GB-50016-2014-建筑设计防火规范2018修
- [资格考试]五年级上册品社复习资料(第二单元)
- [资格考试]2.对XX公司领导班子和班子成员意见建议
- [资格考试]关于市区违法建设情况的调研报告
- 二0一五年下半年经营管理目标考核方案
- 2014年春八年级英语下第三次月考
- 北师大版语文二年级上册第十五单元《松
- 2016国网江苏省电力公司招聘高校毕业生
- 多渠道促家长督导家长共育和谐 - 图文
- 2018 - 2019学年高中数学第2章圆锥曲线
- 竞争比合作更重要( - 辩论准备稿)课
- “案例积淀式”校本研训的实践与探索
- 新闻必须客观vs新闻不必客观一辩稿
- 福师大作业 比较视野下的外国文学
- 新编大学英语第二册1-7单元课文翻译及
- 年产13万吨天然气蛋白项目可行性研究报
- 河南省洛阳市2018届高三第二次统一考试
- 地下车库建筑设计探讨
- 南京大学应用学科教授研究方向汇编
- 2018年八年级物理全册 第6章 第4节 来
- 毕业论文-浅析余华小说的悲悯性 - 以《
- 2019年整理乡镇城乡环境综合治理工作总
- 广西民族大学留学生招生简章越南语版本
- 故宫旧称紫禁城简介