Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

2024 IBM i Security Study: Key Trends & Findings

Fortra
05/08/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • 70% of IBM i systems still use inadequate password levels (0 or 1), with an average of 241 users per system having dangerous default passwords where the password matches the username
  • Administrative privilege overuse is rampant, with systems averaging 241 users holding *ALLOBJ authority and 849 users with job control authority, far exceeding operational requirements
  • Only 7% of systems have full exit program coverage to secure TCP/IP connections, leaving the majority vulnerable to unauthorized network access that bypasses object-level security
  • Ransomware poses a real threat to IBM i environments through network shares, with documented production cases of hundreds of thousands of files encrypted despite the platform's reputation as secure
  • Cybersecurity has become the #1 concern in IBM i shops for eight consecutive years, surpassing traditional priorities like high availability and disaster recovery

Annual Security Study Methodology and Scope

Fortra's 2024 State of IBM i Security Study marks the 21st consecutive year of analyzing security configurations across IBM i environments. The study draws from two primary data sources: the free Security Scan tool, which performs non-invasive Windows-based assessments of native IBM i configurations across seven key categories, and deep-dive risk assessments conducted through paid security services engagements. This dual-source approach provides both broad community trends and granular security insights. The study evaluates 98 distinct data points to help organizations understand their security posture, prioritize remediation efforts, and justify security investments. Unlike external port scans, this inside-out methodology examines actual system configurations to reveal true security exposures that are often masked by the platform's reputation as inherently secure.

Critical Findings: Password Security Remains Inadequate

Password security continues to be a fundamental weakness across IBM i environments. The study reveals that 70% of systems still operate at password level 0 or 1, failing to meet minimum security standards. Default passwords—where the password matches the username—remain alarmingly common, with an average of 241 users per system having default credentials. While there has been modest improvement from 2023 when only 30% of systems met level 2, 3, or 4 requirements, the persistence of weak password policies represents a critical vulnerability. Notably, no systems evaluated in 2023 achieved password level 4, though 2024 data shows some progress. The study emphasizes that password expiration alone is insufficient, as expired passwords still allow batch job execution. Organizations must implement comprehensive password policies including minimum complexity requirements, eliminate default passwords entirely, and consider multi-factor authentication to address this foundational security gap.

Administrative Privilege Overproliferation

The study documents widespread overuse of special authorities, with systems averaging 241 users holding *ALLOBJ authority—effectively granting full administrative access. Job control authority has increased dramatically to 849 users per system (up from 442 in 2023), while IO SysConfig authority rose to concerning levels given its ability to create network shares. Year-over-year analysis shows the percentage of users with *ALLOBJ has fluctuated significantly, with 2021-2022 showing major spikes before improvements in 2023, though 2024 saw a slight uptick. The data reveals that most users don't actually require special authorities for their daily application work. Authority collection tools can identify precise object-level permissions needed, enabling organizations to implement least-privilege access models. The study recommends temporary privilege elevation for specific tasks rather than permanent administrative rights, particularly as cyber insurance policies increasingly mandate stricter controls on administrative access and multi-factor authentication for privileged users.

Network Security and Ransomware Exposure

Exit program deployment remains inadequate, with only 7% of systems implementing full coverage across all TCP/IP connection points (up from 3% in 2023). This gap leaves systems vulnerable to unauthorized access through FTP, ODBC, and other network protocols that bypass traditional object-level security. The study highlights the critical threat of ransomware to IBM i environments, particularly through network shares. Root directory shares expose the entire IFS including QSYS.LIB to potential encryption or deletion by ransomware. Real-world production incidents documented by Fortra include cases of half a million files encrypted by ransomware on IBM i systems. The study emphasizes that high availability solutions replicate malware infections rather than protecting against them, and that native IBM i objects, while immune to infection, are not immune to deletion or impact. Organizations must eliminate root shares, implement read-only shares where possible, deploy native antivirus with scan engines, and use exit programs to control network access behavior.

Chapters

0:00 - Welcome and Introduction
1:01 - Study Overview and Methodology
4:41 - Security Scan Tool Explanation
6:56 - Risk Assessment Data Source
7:11 - Cybersecurity as Top Concern
9:11 - Audience Poll: Security Projects
10:48 - Why Security Study Still Necessary
22:05 - Password Level Findings
23:54 - Default Password Risks
26:04 - Password Remediation Steps
27:49 - Administrative Privileges Analysis
32:21 - Reducing Special Authorities
34:01 - Exit Program Coverage
46:00 - Ransomware and IFS Security
48:28 - Real-World Attack Examples
49:10 - Network Share Protection
51:06 - Security as a Process
51:43 - CIS Benchmarks
52:17 - Key Takeaways
54:04 - Fortra Resources and Services

Key Quotes

7:54 "The IBMI was considered a secure platform and that you didn't really have to do much to it except for turn it on. The truth is, is it is probably the most securable platform that there is and IBM provides you a lot of those tools built right in, but you do have to take those steps because they ship that machine to you to run and to run unimpeded."
9:03 "It looks like cybersecurity is really an important feature here. So we have to think about why the security study is still necessary. So we've been talking about this for over 20 years. Why are we still doing it? ..."
22:42 "We always would hear, well, our users can't handle complex passwords. 15 years ago when I started doing this, maybe 20 years ago, not everybody had a banking application. Not everybody had to have passwords for their internet access or for their phones. People know about passwords now."
24:07 "When the server itself has the core data for the company, and your passwords are so weak that it is literally the same as your username, you're not doing your best to protect those assets."
28:03 "The average across all the systems we evaluated, there were 241 users that would have all object. And with all object, you can very quickly and very easily add all the rest of the special authorities to your user profile. You truly are an admin with only all object as your special authority."
46:29 "The native objects are immune from infection, but not from impact. Depending on what has been shared, if you've shared the root directory, qsys.lib is part of that. It is, in fact, able to be impacted. If something is unable to be encrypted by ransomware in an attack, it will very often be deleted."
47:00 "We do hear a lot that high availability is what we use for backups. This is how we protect from downtime. Unfortunately, high availability replicates the viruses and any actions that were taken by malware in malware or ransomware attacks."
48:28 "We have some real-world production examples of impacts that we've seen on customer systems. It's starting, I can't even, it's been, I think eight years ago was one of the very first major impact I saw with the half a million files encrypted by ransomware. Unfortunately, we continue to see this happening over and over again."

Categories:
  • » Data Protection » Backup & Recovery
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Compliance & Governance
  • Security Operations
  • Webinar
  • Technical Deep Dive
  • Best Practices
  • IBM i Security
  • Password Management
  • Administrative Privileges
  • Exit Programs
  • Ransomware Protection
  • Network Shares
  • Default Passwords
  • Special Authorities
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: 2024 IBM i Security Study: Key Trends & Findings

              Upcoming Webinar Calendar

              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Implementing Effective Strategies for Active Directory Security and Data Protection
                https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                APAC: Establishing an AI Governance Framework for GenAI Throughout the Deployment Process
                https://www.truthinit.com/index.php/channel/1953/establishing-an-ai-governance-framework-for-genai-throughout-the-deployment-process/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/28/2026
                10:00 AM
                05/28/2026
                Harnessing AI: Transforming Perception into Purposeful Mastery
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transforming-perception-into-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                AI in the Fast Lane: Effectively Managing AI Security for Small Teams
                https://www.truthinit.com/index.php/channel/1951/ai-in-the-fast-lane-effectively-managing-ai-security-for-small-teams/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Satori Spring: Insights from Recent Research on the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/satori-spring-insights-from-recent-research-on-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: What to Address First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-what-to-address-first/

              Upcoming Events

              • May
                12

                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage

                05/12/202601:00 PM ET
                • May
                  12

                  Implementing Effective Strategies for Active Directory Security and Data Protection

                  05/12/202611:30 PM ET
                  • May
                    13

                    Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage

                    05/13/202601:00 AM ET
                    • May
                      13

                      Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage

                      05/13/202605:00 AM ET
                      • May
                        19

                        Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle

                        05/19/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version