February 1, 2012 - Vol 2, Issue 3
SecureMyi.com Security Workshop
Expert Webinar - Integrating IBM i with Entrprise Siem and Monitoring Solutions





Subscribe to the SecureMyi Security Newsletter - Get Dan Riehl's book PowerTips for IBM i Security

Feature Article

Forensic Analysis using QAUDJRN - CL Command Usage

By Dan Riehl

In the first article of this series dealing with forensic analysis using the QAUDJRN journal, the focus is on the forensic analysis of CL command usage. I show you how to audit and report on every CL command run by a particular user and also how to audit and report on every use of a particular CL command of interest. As examples, I examine how to audit and report on every CL command run by QSECOFR, and I show how to audit and report on every usage of the Change User Profile (CHGUSRPRF) CL command.

What Is Auditing?

When I discuss the topic of auditing, I'm referring to the IBM i auditing capability in which certain predefined activities or events cause an audit log record to be written as a formatted journal entry to the system's audit journal QAUDJRN. Auditing using QAUDJRN isn't automatically configured, so when you first start your system, you must configure the IBM i QAUDJRN auditing to meet your specific auditing requirements as defined by the system administrator, the security officer, the security policy, and your IT auditors.

Once you've configured your auditing environment, regular reporting of the QAUDJRN activities and events should be instituted to ensure adherence to policy. When audit journal entries are written to QAUDJRN, you have the sound basis needed to accurately analyze and report on current and historical events.

Even assuming a regular QAUDJRN reporting regimen, there will be occasions when you need to go back and dig out past events. These past events may have negatively affected your system, or you may want simply to check on who did what, when. For example, you may want to determine who changed Fred's user profile to assign him *ALLOBJ and *SECADM special authority. When did it occur, and how was it accomplished?

In cases like this, you can use forensic evaluation methods to extract the relevant audit entries from QAUDJRN to determine the culprit. In recent cases, I have been asked to use the QAUDJRN forensic reporting methods to solve some interesting mysteries, such as:

  • A particular user profile keeps becoming disabled. Why?
  • An RPG program ran correctly on Saturday but ended abnormally on Sunday. Did someone change the program between Saturday and Sunday?
  • Who changed the System Value QCRTAUT from *ALL to *CHANGE, and when did the change occur?
  • How did a new file end up in a library with incorrect private authorities, when the library's CRTAUT was specified correctly?
  • Who has used the UPDDTA(DFU) command, and what files were they viewing and potentially editing?
  • What CL commands were run from the command line by all *ALLOBJ users?
  • Who has run compiler commands (e.g., CRTRPGPGM, CRTBNDRPG, CRTCLPGM, etc.) to create new programs on the production system?

All these mysteries were successfully solved by using the forensic analysis methods for the QAUDJRN journal.

Read More

In This Issue

Featured Article - QAUDJRN Forensics

Security Shorts - Library Authorities

Industry News and Calendar

Security Resources


Quick Links

SecureMyi Website

Security Training from The 400 School

SecureMyi Newsletter Home and Archives



Please Visit Our Sponsors


Platinum Sponsor
      The 400 School, Inc



Gold Sponsor
      Software Engineering of America


Sponsor
      Cilasoft Security Solutions

      Skyview Partners, Inc


IBM i Security and Audit Resources

Free Security Videos from Securemyi.com

IBM i Security Reference - IBM i 6.1

IBM i Security Reference - IBM i 7.1

Just added

QAUDJRN Audit Types By AUDLVL 6.1

Just added

QAUDJRN Entry Type Record Layouts 6.1


PCI SSC Data Security Standards

COBIT Framework - ISACA

HIPAA Resources

HITECH Enforcement

CISSP - Certification






Follow securemyi on Twitter




Follow securemyi on YouTube

Security Compliance Automation Tools - Designed by Carol Woodbury - Security Policy Compliance - Vulnerability Assessments - Audit Journal Reporting - Register today for a FREE Trial! - Brought to you by SkyView Partners



Expert Webinar - Integrating IBM i with Entrprise SIEM and Monitoring Solutions

IBM i Security Industry News

Raz-Lee Security is offering the worldwide AS/400 community its recently-released 2012 Anti-Virus product for FREE with a permanent license.
Read more about the FREE offer, and Download the software.

CCSS announces new security features available within the latest version (V7) of its real-time message monitoring and escalation solution, QMessage Monitor (QMM).
View the CCSS Video explaining the new features in V7.



IBM i Security Calendar of Events


Live Security Webcasts for IBM i

Integrating IBM i Security with Enterprise SIEM and Monitoring Solutions
Expert Webinar Series - Sponsored by Software Engineering of America, Inc
Thursday February 2 1:00 p.m. EST
More Information and Register to Attend

Coffee with Carol: Where do I Start with IBM i Security?
Featuring Carol Woodbury
Sponsored by Skyview Partners
Wednesday February 8 10:00 a.m CST
More Information and Register to Attend

Best Practices for Security and Compliance with IBM i
Featuring Jeff Uehling of IBM and Carol Woodbury of SkyView Partners
Sponsored by IBM
Thursday February 9 2:00 p.m EST
More Information and Register to Attend

Product Update Webcast - New Features in AP-Journal
Razz-Lee Security
Thursday February 9 10:00 a.m EST
Send Email for More Information

Understanding Log Management on the IBM i
Sponsored by Townsend Security
Tuesday February 14 2:00 p.m EST
More Information and Register to Attend

Addressing and Automating Audit Requirements for the IBM i
Featuring Carol Woodbury
Sponsored by Skyview Partners
Wednesday February 22 Noon CST
More Information and Register to Attend


Additional IBM i Security Related Events

March 21-22 - 27th Annual Spring Technical Conference
Wisconsin Midrange Computer Professional Association
The conference will be held at Grand Geneva in Lake Geneva, WI.
More Information and Register to Attend

April 10-13 - Live 4-Day Expanded Security Workshop for IBM i
Live Online Security Workshop from The 400 School and SecureMyi.com
Dan Riehl presents his 4-Day Live Online Hands-on Security Workshop for the IBM i
April 10-13. Very limited seating. Register early to reserve your seat in the class.

May 6-9 - COMMON User Group - Annual Conference and Expo - Anaheim, CA





Expert Webinar - Integrating IBM i with Entrprise SIEM and Monitoring Solutions


Security Shorts -
The Truth About Library Authorities

By Dan Riehl

A popular misconception is that if a library is secured as *PUBLIC AUT(*USE), then this library authority provides Read-Only access to the files that reside in the library. For most of use who read this newsletter, we know that this is not true.

Here are the rules for library authorities.

*EXCLUDE Authority

If a user has *EXCLUDE authority to a library, they cannot access the library, nor can they access the objects within the library.

*USE Authority

If a user has *USE authority to a library, they can access the library, but cannot change attributes of the library, such as the library text. The user cannot add new objects to the library.

When it comes to accessing the objects within the library, the object authority is the determining factor. For example, if a user has *EXCLUDE authority to a file in the library, they cannot access the object. If a user has *USE authority to a file in the library, they have read-only access to the file. If the user has *CHANGE authority to a file, they can open the file for update and manipulate the records in the file (add, change, delete). If the user has *ALL rights to the file in the library, the user may perform all operations on the file including deleting the file. Yes, that's right. If a user has *USE authority to a library, the user can delete an object from the library if the user has *ALL authority or *OBJEXIST authority to the object.

*CHANGE Authority

If a user has *CHANGE authority to a library, they can access the library and can change some attributes of the library. Changes to some attributes require the additional *OBJMGT(Object Management) authority to the library. All of the same object rules are in effect as when the user has *USE authority to the library, but there is one big difference. If a user has *CHANGE authority to a library, they can create new objects in the library. That is the only real difference between *USE and *CHANGE authority to a library. If you have *CHANGE authority, you can add new objects.

*ALL Authority

If a user has *ALL authority to the library, the user can access the library, and may even be able to delete the library and all the objects within the library. However, if the user does not have *ALL authority, or a mixture of *OBJEXIST and *OBJOPR authority to the objects in the library, the user cannot delete those objects and therefore cannot delete the library. If a user has the authority to delete all the objects in the library, then the library itself can be deleted. All of the same rules apply to object access as when the user has *USE or *CHANGE rights to the library.

What about *ALLOBJ Authority?

When dealing with library and object authorities, you always have to take into account that some user profiles have *ALLOBJ special authority. When a user has *ALLOBJ special authority, there are no restrictions on accessing objects in your user libraries. A user with *ALLOBJ special authority can read, change and even delete any object in any user library on the system.

(Note: There are some objects that may not be deleted even by a user with *ALLOBJ special authority. For example, user profiles cannot be deleted by an *ALLOBJ user, unless that user also has *SECADM special authority.)


Sponsored Links

IBM i, iSeries and AS/400
Security Services from SecureMyi

Expert Level Security Consulting
IT Security and Compliance Group, LLC

In Depth Security Assessment of IBM i
Upgrade to QSECURITY level 40 or 50
Forensic Research and Analysis
Audit Assistance and Remediation
Security Training for IT and Audit Staff
Security Software Selection & Configuration
Customized Security/System Programming


Subscribe to the SecureMyi Security Newsletter - Get Dan Riehl's book PowerTips for IBM i Security

Live Training - The 400School.com

Live Online Hands-On Workshops

Special February-April Class Discounts


Now Accepting Credit Cards

System Operations Workshop-Feb 27-Mar 2
System Administration & Control - Mar 12-16
Interactive RPG IV Programming - Mar 26-30
Expanded Security Workshop - Apr 10-13
Control Language Programming - Apr 16-20
Intro to RPG IV Programming - Apr 30-May 4




Send your IBM i Security Related News and Events!           Advertise in SecureMyi.com Security Newsletter

Copyright 2012 - SecureMyi.com, all rights reserved

SecureMyi.com | St Louis MO 63017