Compliance & Audit Tools for IBM i

IT Compliance audits are a fact of life in today’s world. Determining for yourselves, and proving to your auditors, that your systems are compliant is a painful and time-consuming task. Even more so if you and/or your auditors do not have a wealth of experience on the IBM i. Using the right tools puts you in control of ensuring that you can review the security policy information you need, when you need it.

Our onsite and offsite services include the following areas:

Governance & Security Policies​

The majority of companies, if not all, have some form of cybersecurity regulatory compliance obligations governing the data they store on their servers. Whether it is by way of government regulations and guidelines (such as Singapore’s MAS TRM Guidelines or Personal Data Protection Act or the EU’s General Data Protection Regulations (GDPR)) or industry regulations (such as PCI-DSS), it is highly likely that there is data on your server for which securtiy and access control is governed by an external agency.

In addition to this, it is also highly likely that your servers contain data that is sensitive to your business itself (for example pricing information, contract details, product recipes or bill of materials, and so forth), the inadvertant access to or leakage of which could result in damages to your commerical operations.

The combination of these external and internal security requirements will be used to determinie your organisation’s Security Policy, the written document that defines your security rules.

 

Compliance & Auditing of Security Policies​

The creation of a Security Policy is meaningless without ensuring that it is being complied with. Complying with so many mandates, regulations, guidelines, and internal policies is tough enough for the compliance and IT teams. Proving to auditors that your system is compliant can be even tougher.

Audit reporting is often a manual task, and the native IBM i audit reporting functions are limited – they are generally extract only, have no scalability to handle multi server or multi partition environments, the log format is proprietary, and there is no native integration with the popular Security Incident and Event Management (SIEM) solutions.The result is that, without using third party tools, regular up-to-date reports on how your IBM i is doing against your Security Policy, whether asked for by your auditor or for your own piece-of-mind, are hard to come by.

Compliance and Audit Reporting Made Easy​

Working with our business partners, JouleTech can enable you to automate the generation of the reports that auditors demand of you, to help you get better visibility on how your IBM i systems are doing against your Security Policy and compliance requirements, and how to remediate any problems or incidents quickly and efficiently.

Contact Us today to learn more.