Managing IBM i Users with Special Authorities:
Reducing Organizational Risk by Implementing Temporary Elevated Authorities
Too many IBM i users with security officer and elevated security authority creates organizational risk, leading to security breaches, regulatory fines, audit violations and accidental system damage.
In this On-Demand webinar, We discuss how to reduce these IBM i organizational security risks by:
• Removing permanent elevated security access from IT, consultants, and non-organizational IBM i users, replacing it with temporary emergency security access to IBM i applications and data, as needed
• Enabling monitoring and reporting functions to ensure emergency elevated security access is not misused• Enforcing separation of duty and other audit/regulatory requirements for secured access
Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His background includes working in IBM i space for quite a number years with a large extent of his experience coming from heavy involvement with securing the IBM i. He is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end to end security solutions in the IBM i environment.