In the world of enterprise IT, the IBM i (formerly AS/400) is a powerhouse of reliability. However, it often exists as an island. On one side, you have the IBM i Administrators, the guardians of uptime and performance. On the other, the Security and Compliance Officers, the guardians of data integrity and regulatory standards.
IBM i environments rarely fail audits due to missing controls. Instead, they fail because administrators and security teams misunderstand each other. This gap isn’t a technical glitch; it’s a compliance gap that leaves businesses vulnerable to audits and bad actors. Organizations overlook this gap because it’s hidden—admins focus on uptime and performance, while security pros chase regulatory checkboxes. This misalignment leaves systems vulnerable.
The result:
I’m working with clients in various regions, including South Asia, Southeast Asia, and the Middle East, for years. As a service provider/vendor, I’ve also observed a gap between IBM i administrators and Security/IS audit teams in many clients. Sometimes, aligning these teams together for implementations is challenging.
This gap does more damage than any single misconfigured system value. In this post, I explore the roots of this issue, why it persists, real-world audit horror stories, and practical ways to close it. I include examples and IBM i commands to make actionable steps clear.
Organizations compound the problem by siloing teams. Admins report to IT operations, security to compliance officers. This structure fosters “us vs. them” dynamics, where admins resist security mandates as bureaucratic hurdles. Administrators and security teams often talk past each other because they use different vocabularies.
Admins prioritize system reliability and efficiency, discussing concepts like object authorities, user profiles, and system values in operational terms. Security teams, however, frame everything through risk, compliance standards like PCI DSS or GDPR, and threat vectors. This mismatch creates confusion during discussions or audits.
The Conflict
QAUDJRN and kill our system performance?”Because the IBM i uses a proprietary database (DB2 for i) and unique logging structures, security teams often treat it as a “black box,” assuming it’s inherently secure because it’s “obscure.” This is a dangerous myth.
| How Admin Team Think | How Security Team Think |
|---|---|
| Administrators describe IBM i in operational terms: | Security teams describe IBM i in control and risk terms: |
| Jobs Subsystems Libraries Profiles Authorities Performance impact “This has worked for 20 years” | Least privilege Segregation of duties Logging completeness Audit evidence Regulatory mappings Incident traceability |
| Their success metric: “The system runs. Users are happy. Nothing breaks.” | Their success metric: “We can prove control effectiveness to an auditor.” |
Both teams talk about security, but they mean different things.
The problem isn’t ALLOBJ.
The problem is no shared remediation model.
IBM i boasts robust built-in security, but teams leave tools gathering dust due to overconfidence, complexity, and competing priorities. Many admins believe the system’s “out-of-the-box” security suffices, a myth rooted in its legacy as a closed platform. In reality, default settings like passwords matching user profiles invite breaches.

Many organizations purchase expensive Security I tools, only to realize they aren’t capturing IBM i data correctly.
Example 1: The “Disabled Profile” Trap
When a user fails a login three times, the IBM i disables the profile.
Example: 2 Take exit programs
IBM i allows registration of custom code to control server access, using commands like WRKREGINF to work with exit points.
ADDEXITPGM EXITPNT(QIBM_QPWFS_FILE_SERV) FORMAT(PWFS0100) PGM(MYLIB/MYEXITPGM) TEXT('IFS Access Security Exit') and they prioritize application support over “hypothetical” threats.Example 3: Performance Fear Without Measurement
Admins hear: “Enable auditing for object access”
QAUDJRNNo baseline. No data. Just fear.
Audit Question
Audits reveal the gap’s consequences in stark detail. Fortra’s annual State of IBM i Security Study analyzes hundreds of systems and uncovers persistent issues. In 2022, only 10% monitored network exits, leaving data flows unchecked. One audited partition had over 100 users with default passwords, a direct path for attackers.
In many shops, admins use the QSECOFR (Security Officer) profile for daily tasks because it’s “easier.” During an audit, if the security team cannot show who was behind the QSECOFR session, the company fails the “Accountability” requirement of PCI-DSS or SOX.
Many legacy systems still run with default security settings from twenty years ago.
DSPSYSVAL SYSVAL(QSECURITY)20 or 30, the system lacks resource-level security. A security team might demand level 40 or 50, but the Admin fears that changing it will break legacy COBOL programs.DSPAUDJRNE ENTTYP(AF). The incident cost thousands in downtime and fines.DSPOBJAUT OBJ(LIB/FILE) OBJTYPE(*FILE), exposing patient data. Remediation involved revoking authorities with RVKOBJAUT, but the gap delayed fixes.ANZDFTPWD could have identified them, but admins skipped it. Ransomware exploited this, encrypting files and demanding payment. These examples show how organizational disconnects turn minor oversights into major crises.Many IBM i teams proudly say: “We’ve never had a security incident.”
Security teams hear: “We don’t detect incidents.”
On IBM i:
“No incidents” often means no visibility.
Teams close the compliance gap by adopting shared metrics that translate admin actions into security outcomes. Start with joint dashboards tracking key indicators like user profile compliance, exit point coverage, and audit journal reviews. Many Compliance Assessment and Reporting Tools provide centralized views without remote access, maintaining separation of duties.
Least privilege enforced*ALLOBJ profiles reduced per quarterNumber of adopted authority programs actively used
Object access loggedPayroll data accessed outside payroll window
Finally, leadership must champion this. Appoint a liaison role to facilitate communication, ensuring metrics like breach response time or compliance score become KPIs for both teams.

The compliance gap in IBM i environments wastes resources and invites risks, but organizations fix it through better communication, tool adoption, and metrics. Admins and security teams unite when they share a common goal: resilient systems. Start small—run a joint audit with the commands I mentioned—and build from there. Your IBM i deserves it, and so does your business.