Text
Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to adequately secure critical data stored in IT systems.
To improve security and avoid failing compliance audits, organizations around the world are implementing a tighter set of controls over the configuration and use of their critical business applications and servers. IT groups support this effort by running audit reports against their critical financial systems quarterly or even more frequently.
Download this guide to learn how to review key items on IBM i (AS/400, System i), including:
- Configuration data
- Transactional log information
- User profile attributes
- Network services
- Database access