Let me walk you through some of the lapses we’ve seen happening in financial institutions that rely on AS400 and similar legacy systems. These aren’t theoretical risks, they’re drawn from real breaches and misconfigurations that have cost organizations millions in losses, fines, and reputational damage. From delayed patching and weak monitoring to insider threats and poor identity management, the patterns are clear: when basic security hygiene is overlooked, attackers find a way in.

In one case, attackers exploited a known vulnerability that had not been patched in time. They slipped in through a weak web application, installed malware, and quietly siphoned off sensitive payment data for more than a year before anyone noticed. The lack of timely patching, weak monitoring, and outdated certificates turned a preventable flaw into a multi-million-dollar breach.

In another instance, an employee who left the company still had active credentials to core systems. Weeks after their departure, they were able to log in and download sensitive financial records without being flagged. The absence of proper offboarding controls and real-time audit checks turned a simple oversight into a large-scale data exposure.

And beyond headline incidents, we continue to see common misconfigurations that create unnecessary risk, like users with *ALLOBJ authority, weak passwords without MFA, unencrypted backups, open legacy protocols like TELNET, and live financial data copied into unsecured test environments.

Each of these lapses reinforces the same lesson: AS400 may be a strong platform, but without disciplined security practices and the right service provider, even the strongest systems can become points of failure.

5 Practical Steps for Locking Down AS400 Security

Securing AS400 (IBM i) in financial institutions is not about one control or one tool. It requires a layered approach that addresses the network, the system itself, data, users, and operations. Each layer strengthens the others, helping institutions protect sensitive data and reduce compliance risks.

Steps to Secure AS400

1. Network Security

Restrict access with firewalls, subnet segmentation, and VPN-only remote connections.

Encrypt all communication with SSL or TLS to prevent interception.

Monitor network traffic using SIEM tools for real-time anomaly detection such as unusual login times or unknown IP addresses.

Eliminate unused or legacy protocols. Keep only what is essential, such as secured FTP or encrypted ODBC.

2. System-Level Security

Set the QSECURITY parameter to level 40 or 50 for financial workloads.

Stay current with IBM’s monthly security patches and firmware updates.

Enable QAUDJRN audit logging to capture system activity, profile changes, failed logins, and unauthorized access attempts.

Use compliance automation tools to validate configurations continuously and generate audit-ready reports.

3. Object and Data Security

Apply least privilege principles by granting minimum necessary authority.

Avoid giving *ALLOBJ authority except in rare cases, and log its use.

Encrypt sensitive data stored in Db2 and in backups. Ensure all in-transit data uses encrypted channels.

Keep production data out of test environments. Use masking or anonymization if test data is required.

Harden the Integrated File System (IFS) by removing *PUBLIC write permissions and monitoring folder access to prevent ransomware.

4. User Identity and Authentication

Enforce strong password policies with high complexity, length, and expiration rules.

Deploy multi-factor authentication for administrative and sensitive accounts.

Review user access regularly, disabling inactive or obsolete accounts.

Implement role-based access control so that permissions align with job responsibilities.

Integrate AS400 with enterprise IAM and single sign-on for consistent policies.

5. Data Protection and Backup

Encrypt all backup media with strong keys and rotate them regularly.

Test disaster recovery procedures to ensure they work under pressure.

Mask sensitive fields such as card numbers and social security data in reports and logs.

Use replication and high availability features to maintain uptime and data consistency.

Learn more about the top cybersecurity concerns facing AS400/IBM i environments and the best practices financial institutions can follow to strengthen defenses, ensure compliance, and reduce breach risks.

Why Security Issues Surface on AS400 Systems in Financial Institutions

The AS400 (IBM i) has long been trusted in banking and finance for its security and reliability. However, security problems still arise in many institutions. These issues are not caused by flaws in the platform itself but by mismanagement, poor configurations, and a lack of ongoing discipline in operations.

Common AS400 Security Issues in Finance

1. Legacy Security Settings

Many environments still run at lower security levels than IBM recommends. Systems left at QSECURITY 30 or below remain exposed to unauthorized access and privilege abuse. Too often, users are given broad authorities such as *ALLOBJ without proper separation of duties. This is not a weakness of the AS400, but a management choice that increases risk.

2. Misconfigurations from Complexity

The AS400 provides granular object-level security and flexible configuration. In practice, this flexibility is mismanaged. Sensitive objects and directories often have *PUBLIC access set incorrectly. Without regular reviews and clear deny-by-default policies, financial institutions create hidden vulnerabilities through configuration mistakes.

3. Operational Oversights

IT teams responsible for AS400 environments are often stretched thin. As a result, user accounts remain active long after employees leave, patches are delayed to avoid downtime, and privileged access reviews are skipped. These gaps in daily operations undermine the system’s built-in security.

4. Weak Monitoring Practices

Audit logs such as QAUDJRN are powerful tools, but many banks fail to monitor them properly. Logs are collected but not analyzed in real time, and alerts are not connected to SIEM systems. This mismanagement allows suspicious activity to go unnoticed until it is too late.

5. Underestimating New Threats

Although AS400 is less prone to common malware, mismanagement of the Integrated File System allows external ransomware or malicious files to spread inside. Attackers often succeed not because the platform is weak, but because staff overlook credential theft risks, insider abuse, and supply chain vulnerabilities.

6. Poorly Managed Integrations

AS400 systems are increasingly connected with cloud platforms, APIs, and third-party applications. When encryption, access policies, and monitoring are not consistently managed across these systems, financial institutions open doors that lead back into the core environment.

7. Compliance Failures

Financial regulations require strict controls, encryption, and reporting. Many banks fail audits not because AS400 cannot meet these standards, but because compliance activities are handled manually or inconsistently. Incomplete access reviews, missing encryption, and poor log retention are the result of weak management, not weak technology.

Take the Stress Out of AS400 Security

Let our experts handle implementation, monitoring, and compliance

AS400 Security Missteps Financial Institutions Continue to Make

The AS400, or IBM i, has a well-earned reputation for reliability in banking and finance. But when security practices lag behind modern standards, even this robust platform can become a weak spot. Time and again, financial institutions repeat the same mistakes — leading to breaches, compliance failures, and costly fines.

Here are the most common missteps, illustrated with real-world lessons from the field:

1. Too Much Access, Too Easily Granted

Broad privileges such as *ALLOBJ or *SECADM are still granted far too often. In practice, this has allowed insiders to quietly pull millions of records without anyone noticing for weeks. Proper segregation of duties and limiting authorities could have stopped the activity before it began.

2. Weak Passwords and No Multi-Factor Authentication

Some environments still allow weak passwords, unlimited login attempts, and no MFA. In one case, attackers brute-forced credentials after multiple failed login attempts and gained system access. Because MFA wasn’t in place, the intrusion went undetected until long after data had been taken.

3. Unprotected Data and Backups

Unencrypted data at rest or in transit is a major liability. Financial institutions have lost backup media in transit, only to discover that the files were never encrypted. The result: exposure of sensitive customer records and immediate regulatory penalties.

4. Ignored Audit Logs

Many banks enable audit logging but never actively review it. In one breach, attackers operated inside the environment for months because no one was monitoring logs or correlating events with a SIEM. By the time the activity was noticed, the cost and impact had multiplied.

5. Outdated Network Protocols

Legacy protocols like TELNET and unsecured FTP are still in use in some AS400 environments. These send credentials and transactions in plain text, which makes them trivial to intercept. Hackers have leveraged this gap to capture login details and pivot deeper into financial systems.

6. Using Production Data in Test Environments

Replicating live customer data into dev or test systems is a common shortcut. Unfortunately, weaker controls in these environments have led to breaches where real customer data was exposed. Proper masking and restricted access would have prevented sensitive information from leaving production.

7. Delayed Patching and Updates

Some banks delay IBM PTFs, fearing downtime. In practice, this has left systems vulnerable to malware targeting known flaws. Institutions that postponed patching faced outages and data loss that far outweighed the risk of planned maintenance.

8. Falling Short on Compliance

Compliance gaps are another recurring issue. Missing encryption, incomplete audit trails, and poor access reviews have all triggered failed audits and multi-million-dollar fines. Relying on annual checklists instead of continuous monitoring is a mistake that regulators no longer tolerate.

Download our whitepaper to explore essential AS400 security measures and protect your IBM i environment from modern threats.

Here’s an AS400 Security Assessment Checklist

  • QSECURITY set to 40 or 50
  • No systems running at level 20 or 30
  • Dormant or unused user profiles disabled
  • Strong password policies enforced (length, complexity, expiry)
  • Multi-factor authentication (MFA) enabled for critical users
  • Role-Based Access Control (RBAC) in place
  • No excessive authorities (*ALLOBJ, *SECADM) assigned unnecessarily
  • Authorization lists reviewed and updated
  • *PUBLIC access on sensitive objects removed
  • IFS directories locked down with proper permissions
  • Data encryption enabled at rest (DB2, backups)
  • Data encryption enabled in transit (TLS/SSL)
  • Test/development data masked or anonymized
  • Journaling enabled for critical database files
  • Legacy protocols (TELNET, FTP) disabled
  • Secure protocols (SSH, SFTP, TLS) enforced
  • Remote access restricted to VPN with strong authentication
  • Firewalls and IP filtering configured
  • Intrusion detection system (IDS) enabled and monitored
  • PTFs and firmware updates applied regularly
  • Change control logs maintained for updates
  • QAUDJRN audit journal enabled
  • Audit journal captures logins, profile changes, object access, config changes
  • Logs integrated with SIEM for real-time monitoring
  • Alerts tested for unusual access or failed logins
  • Object signing and verification enabled
  • Lockable system values secured against changes
  • DST and SST access restricted
  • Backups encrypted
  • Disaster recovery tested regularly
  • High availability or replication strategy in place
  • Recovery playbooks documented and tested
  • AS400 mapped to PCI DSS, SOX, GLBA, GDPR requirements
  • Automated compliance reports generated (access reviews, encryption, logs)
  • Penetration tests and vulnerability scans performed regularly
  • Authority collection reports run periodically
  • Incident response plan for AS400 breaches documented
  • Security awareness training provided for admins and operators

One Final Note

Closing the loopholes is not a one-time task, it is your ongoing responsibility. If you don’t have a dedicated AS400 (IBM i) consultant or managed security team, the chances of missing critical gaps are high. Financial systems demand zero tolerance for errors, so make sure you are giving paramount importance to consistent reviews, audits, and professional oversight.