Case Study

Managing Elevated IBM i Authorities: Best Practices in Data Security and Compliance

Managing Elevated IBM i Authorities: Best Practices in Data Security and Compliance

precisely.com | 877 700 0970 1 Managing Elevated IBM i Authorities: Best Practices in Data Security and Compliance T oo Many Powerful Users, T oo Much Exposure When organizations have too many powerful users, it leaves the system and data exposed to data breaches and other forms of cybercrime. Powerful IBM i special authorities allow users the ability to: • create, change or delete user profiles • change system configurations • change or limit user access Special authorities such as *ALLOBJ and *SECADM are infamous for wreaking havoc – especially if in the wrong hands as these authorities provide full access to all data on the system. Users with elevated authority will have access to data such as customer lists, source code, financial information, valuable intellectual propert

Join for free to read