IBM i Security Insights 2023
IBM i Security Insights 2023
SECURITY STUDY
2023 State of IBM i Security Study
Fortra.com 2
2023 State of IBM i Security Study
Executive Summary
For the 20th year, this study provides compelling insight into the security posture of 112 IBM i servers and partitions—systems that are used to host business-critical
applications, and that often house electronic Personal Health Information (ePHI), financial data, and personally identifiable information (PII).
This is not a recurring study of the same systems each year, but general trends are apparent. Cybersecurity is becoming a higher priority for participating
organizations, and in recent years businesses have made gradual improvements with basic system security and password controls.
However, many organizations are still in the early stages of implementing IBM i security.
Data from seven critical areas of IBM i security, summarized below, reveals the extent of the risk:
Fortra.com 3
2023 State of IBM i Security Study
Table of Contents
About This Study 05
Network Access 16
Conclusion 20
About Fortra 22
Fortra.com 4
2023 State of IBM i Security Study
cybersecurity issues on IBM i. your system grow. • Network-initiated commands and data
access
The weaknesses identified through our scans
• Public accessibility to corporate data
and documented in this study are caused by
poor or missing configurations that can—and • System event auditing
This study shows you the most common and This year’s study includes 112 IBM i servers and
dangerous IBM i security exposures and offers partitions that were audited throughout 2022.
tips for improvement. The average system scanned for this study
has 1,075 users and 567 libraries. The majority
of scanned servers are running on supported
versions of the OS; however, 18% are on v7.2,
which IBM ceased supporting in April 2021.
Fortra.com 5
2023 State of IBM i Security Study
Figure 1 shows the distribution of security settings on the systems included in the 2023 dataset. Out of
PRO TIP: the 112 systems studied, 27 percent are running at system security level 30 and four percent are running
at security level 20. Overall, 30 percent fall short of IBM’s recommended minimum level (Figure 1A). Many
Bring your system up to QSECURITY
running on a sub-par security level are doing so without deliberate intent after having migrated their
level 40 or higher. Outsourcing this task
system values from an older server and are now recognizing the need to take corrective action. Room for
to IBM i security professionals like
improvement remains within this area of IBM i security.
the team at Fortra is a way to quickly
eliminate all the guesswork from the
process. Fortra’s security professionals
can move your security levels from 20
FIGURE 1A: Meeting the Recommended Minimum Level
to 40 or from 30 to 40.
Fail
FIGURE 1: System Security Level 30%
80 74
70
Number of Systems
60
50
40
30
30
Pass
20 70%
10 4 4
0
0
10 20 30 40 50
Fortra.com 6
2023 State of IBM i Security Study
The system values in question are designed to work together as a tri-pass filter that prevents restoration of malicious or tampered objects. But IBM i’s default
values fail to provide this protection, which may leave the system vulnerable.
The system values below work consecutively to determine if an object should be restored, or if it is to be converted during the restore:
Verify Object on Restore (QVFYOBJRST)—71 percent of servers are This value, preset at level 1, controls whether a signature will be
running below the recommended level of 3. validated when a digitally signed object is restored.
Force Conversion on Restore (QFRCCVNRST)—93 percent of servers This value, preset at level 1, controls whether some types of objects
are running below the recommended level of 3. are converted during a restore.
Allow Object Restore (QALWOBJRST)—Less than three percent of This value controls whether programs with certain security attributes,
servers have altered this system value from its default *ALL setting. such as system-state and authority adoption, can be restored.
PRO TIP:
A proactive approach to system values starts with defining and implementing a security policy that incorporates the most secure settings your
environment will tolerate. (Seek professional expertise if you are unsure of the impact of certain settings.)
The free open source IBM i Security Standard from Fortra can help you get started with defining your own policy
Fortra.com 7
2023 State of IBM i Security Study
delete every file and program on the system. This is sometimes • Monitor, log, and report on the use of powerful authorities.
referred to as “root” authority. As shown in Figure 2, this authority
• Be prepared to justify the use of powerful authorities to auditors
is granted to users in unacceptably high numbers.
and managers.
The most frequently granted special authorities were Job Control FIGURE 2: Powerful Users (Special Authorities)
(*JOBCTL) and Spool Control (*SPLCTL), which have been granted 500
442
Number of Users (Average)
Type of Authority
Fortra.com 8
2023 State of IBM i Security Study
The threat persists even if ex-employees never attempt to utilize This process can be performed manually or automated using
these profiles. Other users within the organization might know, Powertech Policy Minder or IBM’s built-in security tools.
for example, that the former IT director’s profile is still on the
system. And whether an inactive profile is exploited by a former
employee, a malicious insider, or a hacker, unusual use of the
profile won’t be detected and reported by the profile owner.
300 279
250
200
150 126
100 76
50
0
All Inactive Profiles Enabled, Inactive Profiles
Fortra.com 9
2023 State of IBM i Security Study
Number of Profiles
140
any actions can be tied to that specific individual. Organizations might 120
struggle to prosecute illegal or unauthorized activity if it became 100 83
evident that the credentials couldn’t unequivocally identify the culprit. 80
60
42
In this study, 16 percent of user profiles have default passwords (Figure
40
4). 61 percent of the systems studied have more than 30 user profiles 21
20
with default passwords. 30 percent are even worse off, with more than
0
100 users with default passwords. One system has a total of 2,256 user All Default Accounts Enabled, Default Accounts
profiles with default passwords and nearly 90 percent of them were in
an enabled state.
PRO TIP:
Establish and enforce strong password policies. The QPWDRULES system
value can ban default passwords, although consideration must be given
to applications or vendor software that create profiles during installation.
Fortra.com 10
2023 State of IBM i Security Study
NIST now recommends using eight-character passwords, up from their previous recommendation of six characters.
Figure 5 shows the setting for the minimum password value on the systems reviewed. According to our results, 48 percent meet or surpass the best practices
standard of eight characters or more. 48 percent of servers in this study fail to satisfy PCI’s requirement of seven-character passwords. Shockingly, 11 percent of
systems permit users to select a password that is less than six characters long and five servers permitted the use of single character passwords.
PRO TIP:
Create a password policy that requires users to use eight or more characters in their passwords. Consider switching from passwords to passphrases,
which are typically 20 to 30 characters long and make brute force attacks impractical.
50
45 42 43
40
35
No. of Systems
30
25
20
15
10
5 4 4 5
5 2 3
1 0 0
0
1 2 3 4 5 6 7 8 9 10 12
Password Characters
Fortra.com 11
2023 State of IBM i Security Study
The latest data shows that IBM i administrators aren’t utilizing all the
password controls available to them:
Password expiration is one area where we see progress. For the systems
Multi-factor authentication can also protect your systems
in our study, the average password expiration interval is 91 days.
from unauthorized access. Another option is eliminating
passwords entirely by implementing single sign-on SSO based
on technology that is included in the IBM i operating system.
Fortra.com 12
2023 State of IBM i Security Study
Figure 6 shows the action taken when the maximum number of allowed
sign-on attempts is exceeded. In 89 percent of cases, the profile is
disabled and this is always recommended. When using explicitly named
devices (as opposed to virtual device names) the recommendation
is expanded to include disablement of the device description. It is
not recommended to disable virtual devices, as the system typically
creates a new device when the user reconnects. The device setting
does not apply to all connections, such as ODBC and REXEC services.
PRO TIP:
The other 11 percent of servers disable the device, but leave the profile To protect your system, make sure profiles are disabled by default
enabled. This creates risk if the user re-establishes a connection, or after the maximum allowed sign-on attempts is exceeded.
perhaps connects to a service that does not require a workstation
device. A tool for self-service password resets can help the users who
have truly forgotten their passwords. Password Self Help for IBM i
Shockingly, about 10% of systems evaluated don’t have a maximum is one option that makes it easy for IBM i users reset a password
number of invalid sign-on attempts defined, allowing an unlimited and it sends instant alerts to designated personnel when
number of guesses at users’ passwords. unsuccessful resets occur.
Fortra.com 13
2023 State of IBM i Security Study
*USE: *PUBLIC can get a catalog of all objects in that library, and
attempt to use or access any object in the library
*CHANGE: *PUBLIC can place new objects in the library and to change *CHANGE
some of the library characteristics 36%
*ALL: *PUBLIC can manage, rename, specify security for, or even delete a
library (if they have delete authority to the objects in the library)
PRO TIP:
Where possible, secure data using resource-level security to protect
individual application and data objects. When this is not possible or
Our findings demonstrate that IBM i shops still have far too many
practical, use exit program technology to regulate access to the data.
libraries accessible to the average user—libraries that often include
critical corporate information. With virtually every system user having Ensure that application libraries are secured from general users on
access to data far beyond their demonstrated need, administrators the system. Although it requires some planning, consider setting the
need better processes to control access to IBM i data. System Value and Library values for Default Create Authority to the most
restrictive setting [*EXCLUDE].
Fortra.com 14
2023 State of IBM i Security Study
Another issue occurs when a user profile is created with permissions granted
to the general user population (*PUBLIC). When *PUBLIC permissions exceed
the strongly recommended setting of *EXCLUDE, this is known as an “unsecured
profile.” It is possible for an alternate user to run a job that leverages the privileges
FIGURE 8A: Default Create Authority by System
of the unsecured profile. This activity will not be logged by the operating system as
a security violation, since it is deemed permissible at all security levels. 70 percent *USE
*EXCLUDE 6%
of systems have at least one unsecured profile and 14 percent of systems have 10
6%
or more profiles that are publicly accessible. This may create a loophole around a
*ALL
QSECURITY setting of level 40 or 50.
7%
PRO TIP:
*CHANGE
There’s a clear need to prioritize cybersecurity and implement security
81%
tools that provide users with secure, frictionless access to the data they
need. Fortra’s Powertech tools can help with that.
Fortra.com 15
2023 State of IBM i Security Study
Network Access
FIGURE 9: One Or More Exit Programs in Place
Services such as FTP, ODBC, JDBC, and DDM can send IBM i data across
the network as soon as the machine is powered on. All end users need
is a free tool from the internet or even tools pre-loaded onto a PC. For
example, Windows comes with FTP client software that easily sends or YES
retrieves data from an IBM i server. 35%
Fortra.com 16
2023 State of IBM i Security Study
18%
of users studied have
Several network interfaces do not acknowledge the command line both command line access
limitations configured in a user profile and must be controlled in other and an enabled profile!
ways. This means that users can run commands remotely, even when
system administrators have purposely taken precautions to restrict
them from using a command line.
PRO TIP:
Based on the broad *PUBLIC authority demonstrated in earlier sections, anyone on these systems can access data, commands, and programs
without the operating system keeping a record.
Start addressing this problem by reviewing network data access transactions for inappropriate or dangerous activity. Be sure to establish clear
guidelines for file download and file sharing permissions. Remove default DB2 access in tools like Microsoft Excel, IBM i Client Access, and Access
Client Solutions.
Fortra.com 17
2023 State of IBM i Security Study
Fortra.com 18
2023 State of IBM i Security Study
Results from the 2023 IBM i Marketplace Survey indicate that 30% of
IBM i professionals regard ransomware as one of their greatest IBM i
cybersecurity challenges. Administrators are also starting to recognize
that IBM i contains file systems that are not immune to infection and,
under certain circumstances, native applications and even IBM i itself
can be impacted.
When the servers in this study were reviewed for antivirus controls, 13 NO
percent were scanning on file open, which is a noticeable increase over 87%
prior years. But this means the other 87 percent are at risk of having
internal objects impacted or of spreading an infection to another server
in their network (Figure 11).
PRO TIP:
Register an exit program to exit point QIBM_QP0L_SCAN_OPEN to intercept file open attempts from the network and scan files before they are opened.
This prevents viruses from spreading outside the IBM i environment.
Install an antivirus solution that runs natively on IBM i, such as Powertech Antivirus for IBM i, to detect and remove infections, as well as prevent malware
from spreading beyond the current environment.
In addition, utilizing an exit program registered to the QIBM_QPWFS_FILE_SERV exit point can help limit actions of remote viruses operating on other
servers on the network, including ransomware attacks.
Fortra.com 19
2023 State of IBM i Security Study
Conclusion
IBM i has a reputation as one of the most securable platforms available. One of IBM i’s great advantages is
that sophisticated tools for securing, monitoring, and logging are built into the OS. But experts agree that
FORTRA IS HERE TO HELP
IBM i security is only as effective as the policies, procedures, and configurations put in place to manage it.
WITH IBM i
This study highlighted a number of common security exposures and configuration management practices Check how secure your IBM i is with a
that must be addressed to protect the data on IBM i systems. No system became vulnerable overnight, Security Scan from Fortra. Security Scan
nor is it possible to fix every security problem in a single day. What’s important is starting somewhere and is free, fast, and reveals your system’s
making continued progress toward a stronger security profile. security gaps. Our Security Advisers
can then help you formulate a plan to
If you’re unsure how to proceed, start with top priorities for IBM i security: remedy your security vulnerabilities.
System Security: Check the QSECURITY level and make sure it’s 40 or higher
Network Access: Register the most common exit points like FTP and ODBC first
Most experts recommend starting with an assessment of vulnerabilities to understand where your system
security stands today and how it could be improved. Security professionals with IBM i expertise and user-
friendly software solutions are available to make this project faster and easier. Fortra offers a range of
options, from a very thorough Risk Assessment to a quick, no-charge Security Scan.
Once you have all the information, you can begin formulating a plan that addresses your organization’s
security vulnerabilities. And from there, security will become business as usual—not a moment of panic
after a failed audit or a data breach.
Fortra.com 20
2023 State of IBM i Security Study
Because IBM Power servers often host sensitive corporate data, organizations need to practice proactive compliance security. As an IBM Advanced Business Partner
with an expansive worldwide customer base, Fortra understands corporate vulnerability and the risks associated with data privacy and access control.
Fortra security solutions and services are the corporate standard for IBM i security at many major international financial institutions. Fortra has demonstrated
a proven commitment to the security and compliance market and leads the industry in raising awareness of IBM i security issues and solutions, leveraging the
experience of some of the world's foremost IBM i security experts.
Fortra.com 21
About Fortra
Fortra is a cybersecurity company like no other. We’re creating a simpler, stronger future for our
customers. Our trusted experts and portfolio of integrated, scalable solutions bring balance and
control to organizations around the world. We’re the positive changemakers and your relentless ally
to provide peace of mind through every step of your cybersecurity journey. Learn more at fortra.com.
© Fortra, LLC and its group of companies. All trademarks and registered trademarks are the property of their respective owners. fta-pt-gd-0423-r1-79d