SecureMyi Security Resources for IBM i


NEW IBM i Security Bulletin on SSL

IBM i Security Videos - SecureMyi

SecureMyi Newsletter Archives

Search Security for IBM i

IBM i Security Ref - 6.1

IBM i Security Ref - 7.1

IBM i Security Ref - 7.2

IBM i Security Ref - 7.3

QAUDJRN Journal Entry Types 7.3

QAUDJRN Entry Layout 7.2

QAUDJRN Entry Layout 7.3

QAUDJRN Entries by AUDLVL 7.2

QAUDJRN Entries by AUDLVL 7.3

RedBook - Security Guide IBM i

Open Security Foundation - DataLoss DB

National Vulnerability Database - NIST

PCI Data Security Standard


HIPAA Resources

HITECH Enforcement

CISSP - Certification

Follow SecureMyi on Twitter <img data-cke-saved-src="" src="" alt="Follow SecureMyi on LinkedIn=" 0"=""> Follow SecureMyi on YouTube
Security Articles and Tutorials by  Dan Riehl

Common Sense Security Auditing
Review options for configuring QAUDJRN auditing options for IBM i.

Are your user profiles open to Abuse?
Can your User profiles be hijacked for abuse?

Nefarious Masqueraders - IBM i Trojan Horse programs
How and where can Trojans be inserted into IBM i?

Security Toolbox Essentials for Managing User Profiles
Dormant users, Default Passwords and Group memberhip.

Exit Points for i/OS Control Language Commands  Part 1
Examines the detail of the CHANGE CL command exit program

Exit Points for i/OS Control Language Commands  Part 2
Examines the detail of the RETRIEVE CL command exit program

Watch this space for additional articles!


Visit The SecureMyi Security Newsletter Archives

for Additional Technical Resources