Planning application security

 

This topic provides on overview for creating an application security plan for your company.

To plan the right security for your applications, you need to know:

As you go through these application planning topics, you answer the first question about what information you plan to store on your system. In subsequent topics, you decide who needs that information and what kind of access people need. You do not enter the application planning information into the system; however, you will need it when you set up users and resource security.

What is an application?

In the first planning step for application security, you need to describe the applications you plan to run on your system. An application is a group of functions that logically belong together. Usually, two different types of applications can run on your server:

What forms do you need?

Describing your applications

At this point, you need to gather some general information about each of your business applications. Add information about your application to the appropriate fields on the Application Description form as described below. Later you can use this information to help you plan user groups and application security:

Application name and abbreviation

Give the application a short name and an abbreviation that you can use as shorthand on forms and for naming objects that the application uses.

Descriptive information

Briefly describe what the application does.

Primary menu and library

Identify which menu is the primary menu for accessing the application. Indicate the library in which the menu is. Usually the primary menu leads to other menus with specific application functions. Users like to see the primary menu for their main application immediately after signing on the system.

Initial program and library

Sometimes applications run an initial program that sets up background information for the user or does security checking. If an application has an initial program or setup program, list it on the form.

Application libraries

Each application usually has a main library for its files. Include all libraries that the application uses, including program libraries and libraries that other applications own. For example, the JKL Toy Company’s customer order application uses the inventory library to get item balances and descriptions. You can use the relationship between libraries and applications to determine who needs access to each library.

Finding information about your applications

If you do not already know the information you need about your applications, you may need to contact your programmer or application provider. Here are some methods for gathering the information yourself, if you do not have access to this information about an application that runs on your system:

To ensure that you gather all the information you need to plan your application security, you should complete these tasks before continuing:

Preparing Application description forms for special applications from IBM, such as IBM® Query for iSeries™ is optional. Access to the libraries used by these applications does not require any special planning. However, you may find it useful to gather the information and prepare the forms.

Drawing an application diagram

As you prepare your Application description and Library description forms, you may find it useful to draw a diagram showing the relationship between applications and libraries. A diagram will help you to plan both user groups and resource security.

Collecting some information about your applications and libraries now will help you with many security decisions you need to make. Look at this as a chance to become more knowledgeable about your system and applications. To ensure that you have gathered the application information that you need, you should:

When you have completed these forms, you can begin planning your overall security strategy.

Planning Applications to Prevent Large Profiles

Because of the potential impacts to performance and security, IBM strongly recommends the following to avoid profiles from becoming too full:

 

Parent topic:

Planning resource security