Modernization efforts have increased the attack surfaces as companies web-enable legacy applications, integrate with other platforms, and expand IBM i’s overall network presence.
Organizations need to apply the same attention to detail for IBM i security as they do for other platforms.
Increased network presence (internal and external), applications (internal and web-based), and excessive user access rights are examples of potential security risks that will be covered in this report.
This template is intended to facilitate security risk awareness. It is not a security assessment. Use the information gathered here to guide more detailed assessments and strategies to secure your IBM i system.