Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

OS/400

Welcome to the OS/400 topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
173 Members
0 Online
6439 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 54 total

Must be a Topic member to contribute
View All »
Guys, I am reviewing the "Sources of Assurance for an AS/400" Document for 2015. I would be grateful if you could let me know of any sources that you use that I am missing. http://www.isaca.org/Groups/Professional-English/as-400/GroupDocuments/Sources_o...
Ian Cooke | 10/26/2017 3:32:40 AM | COMMENTS(4)
Does anyone have an audit program or recent best practice documentation for JDE World security settings, user/group profiles, etc? I cannot find anything online, everything is so outdated. Any help is appreciated. Thank you.
Vaida013 | 1/26/2017 1:19:51 PM | COMMENTS(0)
Verizon Outlines Disturbing AS/400 Breach At Water District http://www.itjungle.com/tfh/tfh031616-story01.html
Ian Cooke | 3/24/2016 12:01:09 PM | COMMENTS(0)
Using the Intrusion Detection System for IBM i http://securemyi.com/nl/wFeb112015.html
Ian Cooke | 2/13/2015 9:37:05 AM | COMMENTS(0)
IBM Clarifies IBM i 6.1.1 And Support Withdrawal http://www.itjungle.com/tfh/tfh092914-story05.html
Ian Cooke | 11/3/2014 7:16:42 AM | COMMENTS(0)
I Can Be You!   Exploiting Unsecured User Profiles http://securemyi.com/nl/wOct222014.html
Ian Cooke | 10/30/2014 11:42:28 AM | COMMENTS(0)

Documents & Publications: 1 total

Must be a Topic member to contribute
Sources of Assurance for an AS/400 (System i, IBM i)
Posted by Ian Cooke 1426 days ago

Events & Online Learning: 0 total

No Results Found

Journal Articles: 0 total

No Results Found

Wikis: 2 total

Blog Posts: 4 total

Must be a Topic member to view blog posts
We have already seen that OS/400 passwords are controlled using system values (http://www.isaca.org/Blogs/273340/Lists/Posts/ViewPost.aspx?ID=18). To refresh: QPWDEXPITV - The number of days for which a password is valid. QPWDMAXLEN - The maximum num...
Posted By : Ian Cooke | 0 comments
According to the IBM System i (AS/400) security guide “system values represent the foundation upon which almost everything else is built. They allow you to customise many characteristics of your system. A group of system values is used to define system...
Posted By : Ian Cooke | 0 comments
In a typical AS/400 RPG / Cobol application access is provided through the users OS/400 profile. OS/400 users may be retrieved using the DSPUSRPRF command (see http://publib.boulder.ibm.com/infocenter/iseries/v7r1m0/index.jsp?topic=%2Fcl%2Fdspusrprf.ht...
Posted By : Ian Cooke | 0 comments
On the AS/400 (System i) it is possible to audit for default passwords using the ANZDFTPWD command. A default password is defined as a password which is the same as the user profile. The command behaves slightly differently depending on the value of the...
Posted By : Ian Cooke | 0 comments