Now that you have the results—in other words, the list of profiles accessing the directory—how do you set the authorities on the directory? Obviously, the profiles currently have access, but the goal is to secure the directory (as in set the directory to be *PUBLIC *EXCLUDE). Unless the profile has *ALLOBJ special authority and you …
Category Archives: Discovering Who’s Using SSH
Reducing Access to a Directory- Successfully Securing Objects by Using Authority Collection, IBM i Services, and Auditing
Most of my clients have one or more directories that contain confidential information. It may be image files of canceled checks or medical images that are kept permanently. Or a directory that contains a running year’s worth of receipts with Personally Identifiable Information (PII) or invoices or a directory that holds what I call a …