IBM AS400 Security Procedures(7)
Auditor(s) Assigned Audit Date
Workpaper
Audit Objectives and Procedures Ref. By
________________________________________________________________________________________________________
K.3 User/Group Profiles - Cont'd
K.3.5.6 INLPGM (Initial Program) UPINPG
*NONE: No initial program is used. User is given access to the
command level.
The initial program may not provide a way to exit from the program except to sign-off.
If a menu name is specified in the initial menu parameter then that menu is displayed. Ensure that there is no option in the menus/sub-menus to exit and access the command level.
K.3.5.7 INLMENU (Initial Menu) UPINMN
*SIGNOFF: the user will be signed off the system once the initial
program ends.
Menu security limits a user's capabilities and restricts the user to a predefined secured environment. The initial menu appears after the initial program terminates. Ensure that users are assigned menus and menu options that are suitable for their job functions.
The advantages of menu security are that it is easy to implement and therefore, incurs low security management cost; and provides ease to use interface.
Caveat: Initial menus are mostly user-defined and therefore, may contain loop-holes. The application design is critical to menu security.
E&Y recommendation: Use the limited capability approach where appropriate with library and object security.
K.3.5.8 LMTDEVSSN (Limit Device Sessions) UPLDVS
*(SYSVAL: the system value selected determines if the user is
limited to one device session.
*NO: does not limit the use of a user-id to one device session.
*YES: limits the use of a user-id to one device session.
E&Y recommended value: *YES or *SYSVAL and QLMTDEVSSN - Set to Option One(limit number of device sessions to one).
SYSTEM SECURITY K/PROG
30
Page 12 of 22
Auditor(s) Assigned Audit Date
Workpaper
Audit Objectives and Procedures Ref. By
________________________________________________________________________________________________________
K.3 User/Group Profiles - Cont'd
K.3.5.9 STATUS (Status of user profile) UPSTAT
K.3.5.10
K.3.5.11
Specifies whether the user profile is usable or not.
*ENABLED: profile is usable.
*DISABLED: profile is not usable.
E&Y recommendation: Inactive or dormant user profiles should be set to *DISABLE to prevent unauthorized usage.
Note that system profiles such as QSYS, QSECOFR, etc. must be set to *ENABLE.
Obtain a list of user profiles and review for the following: 1. Identify the users permitted access to individual and each group
profile.
2. Determine if all users are permitted access based on written
authorization by Departmental Management.
3. Confirm that all users are currently employed.
Determine whether unauthorized users can process critical
functions from their menu(s).
SYSTEM SECURITY K/PROG
31
Page 13 of 22
Auditor(s) Assigned Audit Date
Workpaper
Audit Objectives and Procedures Ref. By
________________________________________________________________________________________________________
K.3 User/Group Profiles - Cont'd
K.3.6
List all programs which adopt the privileged QSECOFR authority: DSPPGMADP USRPRF(QSECOFR)
[optional
?OUTPUT(*PRINT)? to print]
Plan for running the above command overnight as it slows down the system.
Adopted authority provides a means to handle situations where programs or commands called by a user may require a higher level of authority than is normally available to that user. It allows a user to adopt the authority of the owner of a program whenever it executes, in addition to the authority of the user. This provides a method to give a user more access to objects, but the user is limited to the program function during execution.
K.3.6.1 Determine if the security officer is aware of such programs and if he/she
evaluates any new ones that use the adopted authority.
E&Y recommendation: The security officer should monitor programs that adopt the privileged QSECOFR authority.
K.3.7 Ensure that a security and password policy or guideline has been
developed which includes:
1. the secure assignment and distribution of passwords.
2. password selection criteria.
3. change or immediate removal of terminated employee's
passwords. (Obtain report on Previous Signon Date)
4. periodic changing of passwords.
5. training users in the necessity of password secrecy and sign-off
of workstations when not in use.
6. actions to be taken for attempted security violations.
SYSTEM SECURITY K/PROG
32
相关推荐:
- [资格考试]机械振动与噪声学部分答案
- [资格考试]空调工程课后思考题部分整合版
- [资格考试]电信登高模拟试题
- [资格考试]2018年上海市徐汇区中考物理二模试卷(
- [资格考试]坐标转换及方里网的相关问题(椭球体、
- [资格考试]语文教研组活动记录表
- [资格考试]广东省2006年高应变考试试题
- [资格考试]LTE学习总结—后台操作-数据配置步骤很
- [资格考试]北京市医疗美容主诊医师和外籍整形外科
- [资格考试]中学生广播稿400字3篇
- [资格考试]CL800双模站点CDMA主分集RSSI差异过大
- [资格考试]泵与泵站考试复习题
- [资格考试]4个万能和弦搞定尤克里里即兴弹唱(入
- [资格考试]咽喉与经络的关系
- [资格考试]《云南省国家通用语言文字条例》学习心
- [资格考试]标准化第三范式
- [资格考试]GB-50016-2014-建筑设计防火规范2018修
- [资格考试]五年级上册品社复习资料(第二单元)
- [资格考试]2.对XX公司领导班子和班子成员意见建议
- [资格考试]关于市区违法建设情况的调研报告
- 二0一五年下半年经营管理目标考核方案
- 2014年春八年级英语下第三次月考
- 北师大版语文二年级上册第十五单元《松
- 2016国网江苏省电力公司招聘高校毕业生
- 多渠道促家长督导家长共育和谐 - 图文
- 2018 - 2019学年高中数学第2章圆锥曲线
- 竞争比合作更重要( - 辩论准备稿)课
- “案例积淀式”校本研训的实践与探索
- 新闻必须客观vs新闻不必客观一辩稿
- 福师大作业 比较视野下的外国文学
- 新编大学英语第二册1-7单元课文翻译及
- 年产13万吨天然气蛋白项目可行性研究报
- 河南省洛阳市2018届高三第二次统一考试
- 地下车库建筑设计探讨
- 南京大学应用学科教授研究方向汇编
- 2018年八年级物理全册 第6章 第4节 来
- 毕业论文-浅析余华小说的悲悯性 - 以《
- 2019年整理乡镇城乡环境综合治理工作总
- 广西民族大学留学生招生简章越南语版本
- 故宫旧称紫禁城简介