Q3: Is IBM i security auditing turned on and regularly reviewed?
You're Protected
If you answered Yes
Security auditing is one of the best things you can do to control security. Within minutes this facility can be configured and running and in many cases we find that auditing is already switched on; usually for those customers with High Availability software installed.
Security auditing is free; integrated into the system without requiring 3rd party tools and is extremely comprehensive in its abilities. You can proactively detect security issues much quicker and easier; you can use it as a forensic tool when you suspect there have been security incidents and it can also be used to provide answers to a vast number of questions.
By simply adding *SECURITY and *AUTFAIL to the QAUDLVL configuration you will capture most security related events on your system including unsuccessful logins; unsuccessful attempt to access data; amendments to user profiles and changes to system configuration.
Q3: Is IBM i security auditing turned on and regularly reviewed?
You're Not Protected
If you answered No
Security auditing is one of the best things you can do to control security. Within minutes this facility can be configured and running and in many cases we find that auditing is already switched on; usually for those customers with High Availability software installed.
Security auditing is free; integrated into the system without requiring 3rd party tools and is extremely comprehensive in its abilities. You can proactively detect security issues much quicker and easier; you can use it as a forensic tool when you suspect there have been security incidents and it can also be used to provide answers to a vast number of questions.
By simply adding *SECURITY and *AUTFAIL to the QAUDLVL configuration you will capture most security related events on your system including unsuccessful logins; unsuccessful attempt to access data; amendments to user profiles and changes to system configuration.