教学文库网 - 权威文档分享云平台
您的当前位置:首页 > 精品文档 > 资格考试 >

IBM AS400 Security Procedures(8)

来源:网络收集 时间:2025-09-18
导读: Auditor(s) Assigned Audit Date Workpaper Audit Objectives and Procedures Ref. By ________________________________________________________________________________________________________ K.5 Objects O

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

K.5 Objects

Objectives: To ensure that appropriate access authority is defined at

the object level in order to protect specific production data files and programs from unauthorized access.

Object security establishes security at the specific object level. It is used when different objects require different protection requirements. The client may choose to protect specific sensitive objects at the object level if their inherent risk is high or if library level protection is not used. It can also be used as an exception to the general authorization rules.

Procedures:

K.5.1 Select a sample of sensitive production objects (data files or source

programs) and print their specific object authorities:

DSPOBJAUT OBJ(library/file) OBJTYPE(*FILE) (for files), and

DSPOBJAUT OBJ(library/program) OBJTYPE (*PGM) (for programs).

K.5.2 Ensure that only authorized users or groups may access or use the

sensitive objects.

K.5.3 Review administration and authorization procedures for granting

access to significant objects.

E&Y recommendation: Since assignment of object authorities to specific objects is tedious, specific object authority should only be defined to handle exceptions; otherwise, the default public authority should be used.

SYSTEM SECURITY K/PROG

35

Page 17 of 22

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

K.6 System Utilities

Objective: To ensure that powerful system utilities are adequately

restricted from unauthorized access and use.

The following are powerful system utilities:

SST System Service Tools DST Dedicates Service Tools DFU Data File Utility SEU Source Entry Utility SDA Screen Design Aid PDM Programming Development Manager QUERY Query Language

Procedures:

K.6.1 Determine who has access to the above utilities:

? DSPOBJAUT OBJ(QSYS/STRDFU) OBJTYPE (*CMD).

? DSPOBJAUT OBJ(QSYS/STRSEU) OBJTYPE (*CMD).

? DSPOBJAUT OBJ(QSYS/STRSDA) OBJTYPE (*CMD).

? DSPOBJAUT OBJ(QSYS/STRPDM) OBJTYPE (*CMD).

? DSPOBJAUT OBJ(QSYS/STRQRY) OBJTYPE (*CMD).

Only authorized programmers should have access to these utilities.

E&Y recommendation: *PUBLIC access should be set to *EXCLUDE, not *USE.

SYSTEM SECURITY K/PROG

36

Page 18 of 22

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

K.7 System Commands

Objective: To ensure that powerful system commands are adequately

restricted from unauthorized use.

The following are powerful system commands:

* CRTUSRPRF Create User Profile * CHGUSRPRF Change User Profile * DLTUSRPRF Delete User Profile * RSTUSRPRF Restore User Profile

?? CHGDSTPWD Change Dedicated Service Tool Password

RSTAUT Restore Authority # STRSST System Service Tools ~ CRTAUTHLR Create Authority Holder ? DLTAUTHLR Delete Authority Holder ?? SAVSYS Save the System

~ CHGSYSLIBL Change System Library

CHGSYSVAL Change System Value

* Restricted to the security administrator (QSECADM) and security

officer (QSECOFR) only. PUBLIC access is irrelevant. A user cannot use these commands even if he/she has *ALLOBJ special authority.

# Restricted to the service engineer (OSRV) only. ~ Restricted to the security officer (QSECOFR) only.

? You need the DST security password to change the DST passwords. ? Restricted to *SAVSYS capability holder. ? *PUBLIC should be set to *EXCLUDE.

See the sensitive command object authority matrix.

SYSTEM SECURITY K/PROG

37

Page 19 of 22

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

K.7 System Commands - Cont'd

Procedure:

K.7.1 Review the object authority to the above significant security related

commands:

DSPOBJAUT OBJ(QSYS/cmd) OBJTYPE(*CMD).

Ensure that only authorized personnel may use these commands.

E&Y recommendation: Public authority of these commands should be set at *EXCLUDE.

Command source object contains …… 此处隐藏:2035字,全部文档内容请下载后查看。喜欢就下载吧 ……

IBM AS400 Security Procedures(8).doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印
本文链接:https://www.jiaowen.net/wendang/411897.html(转载请注明文章来源)
Copyright © 2020-2025 教文网 版权所有
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ:78024566 邮箱:78024566@qq.com
苏ICP备19068818号-2
Top
× 游客快捷下载通道(下载后可以自由复制和排版)
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
注:下载文档有可能出现无法下载或内容有问题,请联系客服协助您处理。
× 常见问题(客服时间:周一到周五 9:30-18:00)