Previous Topic: Checking AuthorizationNext Topic: Audit Trails


Security Exposure

Most of the likely points of security exposure are covered in the chapter on security in the IBM i (AS/400) CL Programmer’s Guide.

Standards can be adopted to protect from potential exposure on the following points:

Note: Avoid creating programs that adopt the rights of profiles with QSECOFR rights.