第一范文网 - 专业文章范例文档资料分享平台

IBM AS400 Security Procedures

来源:用户分享 时间:2025/5/21 3:05:57 本文由loading 分享 下载这篇文档手机版
说明:文章内容仅供预览,部分内容可能不全,需要完整文档或者需要复制内容,请下载word后使用。下载word有问题请添加微信号:xxxxxxx或QQ:xxxxxx 处理(尽可能给您提供完整文档),感谢您的支持与谅解。

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

K.8

K.8.3

System Logs -Cont'd If the system log is not used, determine if the auditing journal (QAUDJRN) is generated and reviewed.

The Security Officer can monitor security by gathering audit information about specific security-related events. This can be achieved by performing the following steps:

(1) Create journal receiver:

CRTJRNRCV JRNRCV(user-lib/user-name1) AUT(*EXCLUDE)

(2) Create journal:

CRTJRN JRN(QSYS/QAUDJRN) JRNRCV (user-lib/user-name1) AUT(*EXCLUDE)

(3) Change system value:

CHGSYSVAL QAUDLVL VALUES ('AUTFAIL *SECURITY *PGMFAIL ...'

The QAUDLVL values control which security-related events are logged to this journal. E&Y recommended QAUDLVL values are as follows:

? AUTFAIL - logs all access authorization failures;

? SECURITY - logs security-related activities, such as those

related to object authority, user profiles, and system values; and

? PGMFAIL (security level 40) - creates an authorization failure

entry for each object domain, blocked instruction or program validation check failure.

K.8.4

Ensure that there are inquiry letters written by the Security Officer to the users' heads of department when significant access violations are detected by the logging facility. Also review the responses received from the users' heads of department explaining the violations.

Determine if a procedure is in place to provide a report to each user department identifiying the respective department's responsible transactions (especially update) and the authorized users for those transactions. The reports should be provided not less than every 6 months. Verify the authorizations.

K.8.5

SYSTEM SECURITY

K/PROG

Page 22 of 22

40

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

L. Physical Inventory

1. Leases/contracts are available and in force for hardware, including

peripheral equipment, and software.

2. Lists of existing equipment is complete and current (including all

PCs).

3. Determine procedure for disposing of equipment.

4. Validate equipment to the Asset list.

PHYSICAL INVENTORY

L/PROG

41

Page 1 of 1

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

M. System Performance Monitoring

1. Are there performance standards established?

If not, what is the allowable limits of: a. Response time b. Disk Capacity

2. What capacity planning is performed with new systems

development?

3. Is a report provided management depicting system performance?

If yes, how frequent?

SYSTEMS PERFORMANCE MONITORING

M/PROG

N. Preventative Maintenance (PM)

42

Page 1 of 1

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

1. Insure Preventative Maintenance agreements are available.

a. Time period (Start and ending PM dates). b. Equipment description. c. Frequency of PM

d. Charge per call or per year.

2. Insure PM is performed on contracted equipment only.

PREVENTATIVE MAINTENANCE

43

N/PROG

Page 1 of 1

搜索更多关于: IBM AS400 Security Procedures 的文档
IBM AS400 Security Procedures.doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印
本文链接:https://www.diyifanwen.net/c25auh1iacp57eja0pt8d_11.html(转载请注明文章来源)
热门推荐
Copyright © 2012-2023 第一范文网 版权所有 免责声明 | 联系我们
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ:xxxxxx 邮箱:xxxxxx@qq.com
渝ICP备2023013149号
Top