According to the IBM X-Force, misconfiguration is one of the top issues that leave organizations vulnerable. IBM i is not immune to misconfiguration. While there are many ways to misconfigure a system, Carol describes her top five.
By Carol Woodbury
I read articles about security breaches all the time. Except for cases when an organization is targeted by a nation-state or a competitor, the cause of the breach is usually attributed to “misconfiguration.” Misconfiguration can take numerous forms. Several situations come to mind that cause IBM i misconfigurations.