Fill the gap between modules and ILE programs for a full panorama of your ILE application.
Written by Jean-Paul Lamontre
Part I and Part II of this series have shown how some system commands can be used to dissect in depth one application, without the source code. But these analyses suffer from a lack of information for ILE programs—namely, the link between the program and embedded modules.
File Integrity Monitoring techniques prevent unauthorized configuration and data changes from occurring unnoticed.
Written by Robin Tatam
File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files. FIM is a requirement of several regulatory standards, including the Payment Card Industry Data Security Standards (PCI DSS).