The Compliance Gap Between IBM i Administrators and Security Teams

In the world of enterprise IT, the IBM i (formerly AS/400) is a powerhouse of reliability. However, it often exists as an island. On one side, you have the IBM i Administrators, the guardians of uptime and performance. On the other, the Security and Compliance Officers, the guardians of data integrity and regulatory standards.

IBM i environments rarely fail audits due to missing controls. Instead, they fail because administrators and security teams misunderstand each other. This gap isn’t a technical glitch; it’s a compliance gap that leaves businesses vulnerable to audits and bad actors. Organizations overlook this gap because it’s hidden—admins focus on uptime and performance, while security pros chase regulatory checkboxes. This misalignment leaves systems vulnerable.

The result:

I’m working with clients in various regions, including South Asia, Southeast Asia, and the Middle East, for years. As a service provider/vendor, I’ve also observed a gap between IBM i administrators and Security/IS audit teams in many clients. Sometimes, aligning these teams together for implementations is challenging.

This gap does more damage than any single misconfigured system value. In this post, I explore the roots of this issue, why it persists, real-world audit horror stories, and practical ways to close it. I include examples and IBM i commands to make actionable steps clear.

Table of Contents

Two Worlds, One System – The Language Mismatch

Organizations compound the problem by siloing teams. Admins report to IT operations, security to compliance officers. This structure fosters “us vs. them” dynamics, where admins resist security mandates as bureaucratic hurdles. Administrators and security teams often talk past each other because they use different vocabularies.

Admins prioritize system reliability and efficiency, discussing concepts like object authorities, user profiles, and system values in operational terms. Security teams, however, frame everything through risk, compliance standards like PCI DSS or GDPR, and threat vectors. This mismatch creates confusion during discussions or audits.

The Conflict

Because the IBM i uses a proprietary database (DB2 for i) and unique logging structures, security teams often treat it as a “black box,” assuming it’s inherently secure because it’s “obscure.” This is a dangerous myth.

How Admin Team ThinkHow Security Team Think
Administrators describe IBM i in operational terms:Security teams describe IBM i in control and risk terms:
Jobs
Subsystems
Libraries
Profiles
Authorities
Performance impact
“This has worked for 20 years”
Least privilege
Segregation of duties
Logging completeness
Audit evidence
Regulatory mappings
Incident traceability
Their success metric:
“The system runs. Users are happy. Nothing breaks.”
Their success metric:
“We can prove control effectiveness to an auditor.”

The Core Problem

Both teams talk about security, but they mean different things.

What Actually Happens

The problem isn’t ALLOBJ.
The problem is no shared remediation model.

Why Security Tools Go Unused on IBM i

IBM i boasts robust built-in security, but teams leave tools gathering dust due to overconfidence, complexity, and competing priorities. Many admins believe the system’s “out-of-the-box” security suffices, a myth rooted in its legacy as a closed platform. In reality, default settings like passwords matching user profiles invite breaches.

The Compliance Gap

Many organizations purchase expensive Security I tools, only to realize they aren’t capturing IBM i data correctly.

Example 1: The “Disabled Profile” Trap

When a user fails a login three times, the IBM i disables the profile.

Example: 2 Take exit programs

IBM i allows registration of custom code to control server access, using commands like WRKREGINF to work with exit points.

Example 3: Performance Fear Without Measurement

Admins hear: “Enable auditing for object access”

No baseline. No data. Just fear.

Where the Gap Shows Up

Audit Question

  1. “How do you detect unauthorized access to sensitive files?”
    • Admin Response: Authorities are set correctly.
    • Auditor Follow-up: “Show me evidence of detection.”
  1. “How do you review special authority usage?”
    • Admin Shows: WRKUSRPRF
    • Auditor Asks: “Who reviews this? How often? Where is it documented?”
  1. Logging Without Context
    • Admins enable auditing: CHGSECAUD QAUDLVL(*AUTFAIL *OBJMGT)
    • Security pulls logs: No one correlates:
      • User
      • Program
      • Adopted authority
      • Business function
    • Auditors call this “logging without monitoring”.

Real-World Audit Failures

Audits reveal the gap’s consequences in stark detail. Fortra’s annual State of IBM i Security Study analyzes hundreds of systems and uncovers persistent issues. In 2022, only 10% monitored network exits, leaving data flows unchecked. One audited partition had over 100 users with default passwords, a direct path for attackers.

In many shops, admins use the QSECOFR (Security Officer) profile for daily tasks because it’s “easier.” During an audit, if the security team cannot show who was behind the QSECOFR session, the company fails the “Accountability” requirement of PCI-DSS or SOX.

Many legacy systems still run with default security settings from twenty years ago.

  • The Command: DSPSYSVAL SYSVAL(QSECURITY)
  • The Gap: If this returns 20 or 30, the system lacks resource-level security. A security team might demand level 40 or 50, but the Admin fears that changing it will break legacy COBOL programs.

Why “No Incidents” Is Not a Success Metric

Many IBM i teams proudly say: “We’ve never had a security incident.”

Security teams hear: “We don’t detect incidents.”

On IBM i:

  • Limited alerts
  • Minimal correlation
  • Sparse review cycles

“No incidents” often means no visibility.

Bridging the Gap with Shared Metrics

Teams close the compliance gap by adopting shared metrics that translate admin actions into security outcomes. Start with joint dashboards tracking key indicators like user profile compliance, exit point coverage, and audit journal reviews. Many Compliance Assessment and Reporting Tools provide centralized views without remote access, maintaining separation of duties.

Finally, leadership must champion this. Appoint a liaison role to facilitate communication, ensuring metrics like breach response time or compliance score become KPIs for both teams.

A Practical Operating Model

Monthly (Admin + Security)

Quarterly

Annually

GO SECURITY

Act Now to Secure Tomorrow

The compliance gap in IBM i environments wastes resources and invites risks, but organizations fix it through better communication, tool adoption, and metrics. Admins and security teams unite when they share a common goal: resilient systems. Start small—run a joint audit with the commands I mentioned—and build from there. Your IBM i deserves it, and so does your business.