IBM AS400 Security Procedures(6)
Auditor(s) Assigned Audit Date
Workpaper
Audit Objectives and Procedures Ref. By
________________________________________________________________________________________________________
K.2 System Security Values -Cont'd
K.2.2.8 Determine if sign-on information is displayed on screen.
QDSPSGNINF - sign-on display information control.
0: no sign-on information is displayed upon sign-on.
1: users are shown:
? date and time of last sign-on.
? invalid sign-on attempts since last sign-on.
? when applicable, a warning that the password is due to expire in
seven days or less.
This information can alert users to unauthorized attempts to use their profiles to access the system.
The sign-on screen should show a restricted access message such as \should also not show the company, system, and application names.
E&Y recommended value: 1.
K.2.3 Changing the Automatic Configuration of Virtual Devices Value
The QAUTOVRT values controls the creation of virtual device descriptions on a remote system when users pass-through to that system.
The system value QAUTOVRT specifies if pass-through virtual devices (as opposed to the workstation function virtual device) are automatically configured. This value can only be changed by the security officer or someone with all object (*ALLOBJ) and security administrator (*SECADM) special authority.
The value of QAUTOVRT should be set as low as possible. In most cases the value of 0 (zero) or 1 (one) is recommended. How ever in some locations where the passthrough activity is higher, it should be set as low as possible to minimize logon opportunities of unauthorized users.
SYSTEM SECURITY K/PROG Page 7 of 22
25
Auditor(s) Assigned Audit Date
Workpaper
Audit Objectives and Procedures Ref. By
________________________________________________________________________________________________________
K.2 System Security Values -Cont'd
K.2.4 Changing the Remote Sign-on Value
The QRMTSIGN value controls if users can bypass the sign-on display on the remote system when using the display station pass-through function or the workstation function of PC support.
The possible values are:
? FRCSIGNON: All pass-through sessions that begin on the system
must go through the normal sign-on procedure.
?
SAMEPRF: Pass-through sessions without going through the sign-on procedure are allowed only for users whose user profile name on the remote system is the same as the user profile name on the local system
?
VERIFY: Pass-through sessions without going through the sign-on procedure are allowed for all pass-through requests and no checking of passwords is done if the QSECURITY value is 10. Must sign-on if QSECURITY value is 30.
?
REJECT: Pass-through sessions are not allowed to start on the remote system.
K.2.5 Create Authority Parameter in System Value
Review the QCRTAUT parameter on the system values report, and ensure that it has been changed from the default value of *CHANGE, to a setting of *USE or less.
Determine that the production database and production source code files are maintained in a library with appropriately restricted access. Or, use the Display Object Authority command and determine whether the Public Authority Access (PUBAUT) access parameter for each significant individual production database and production source code file is *EXCLUDE and individual access allowed are appropriate.
SYSTEM SECURITY
K/PROG
26
Page 8 of 22
Auditor(s) Assigned Audit Date
Workpaper
Audit Objectives and Procedures Ref. By
________________________________________________________________________________________________________
K.3 User/Group Profiles
Objective: To ensure that user or group profiles are authorized and defined
appropriately to maintain adequate segregation of duties.
Procedures:
K.3.1 Obtain all user and group profiles by entering the command:
DSPAUTUSR SEQ (*GRPPRF)
K.3.2 Inspect each significant group profile to ensure that it is authorized by
appropriate management personnel and covers a common group of users with a common function. Ensure that only one group profile is assigned to a user.
K.3.3 Inspect selected user profiles to ensure that they are authorized by
appropriate management personnel and that their settings are compatible with their work functions.
K.3.4 A number of IBM user profiles are pre-defined when the system is
shipped. The passwords to these user profiles are identical to the user profile names, except for DST's which is \ Determine that the client has changed the passwords for these user profiles:
User Profile Description QSECOFR security officer QSRV full service functions QSRVBAS basic service functions QSY
相关推荐:
- [资格考试]机械振动与噪声学部分答案
- [资格考试]空调工程课后思考题部分整合版
- [资格考试]电信登高模拟试题
- [资格考试]2018年上海市徐汇区中考物理二模试卷(
- [资格考试]坐标转换及方里网的相关问题(椭球体、
- [资格考试]语文教研组活动记录表
- [资格考试]广东省2006年高应变考试试题
- [资格考试]LTE学习总结—后台操作-数据配置步骤很
- [资格考试]北京市医疗美容主诊医师和外籍整形外科
- [资格考试]中学生广播稿400字3篇
- [资格考试]CL800双模站点CDMA主分集RSSI差异过大
- [资格考试]泵与泵站考试复习题
- [资格考试]4个万能和弦搞定尤克里里即兴弹唱(入
- [资格考试]咽喉与经络的关系
- [资格考试]《云南省国家通用语言文字条例》学习心
- [资格考试]标准化第三范式
- [资格考试]GB-50016-2014-建筑设计防火规范2018修
- [资格考试]五年级上册品社复习资料(第二单元)
- [资格考试]2.对XX公司领导班子和班子成员意见建议
- [资格考试]关于市区违法建设情况的调研报告
- 二0一五年下半年经营管理目标考核方案
- 2014年春八年级英语下第三次月考
- 北师大版语文二年级上册第十五单元《松
- 2016国网江苏省电力公司招聘高校毕业生
- 多渠道促家长督导家长共育和谐 - 图文
- 2018 - 2019学年高中数学第2章圆锥曲线
- 竞争比合作更重要( - 辩论准备稿)课
- “案例积淀式”校本研训的实践与探索
- 新闻必须客观vs新闻不必客观一辩稿
- 福师大作业 比较视野下的外国文学
- 新编大学英语第二册1-7单元课文翻译及
- 年产13万吨天然气蛋白项目可行性研究报
- 河南省洛阳市2018届高三第二次统一考试
- 地下车库建筑设计探讨
- 南京大学应用学科教授研究方向汇编
- 2018年八年级物理全册 第6章 第4节 来
- 毕业论文-浅析余华小说的悲悯性 - 以《
- 2019年整理乡镇城乡环境综合治理工作总
- 广西民族大学留学生招生简章越南语版本
- 故宫旧称紫禁城简介