iCompliant – IBM i Configuration Assessment Tool

 

IBM i (formerly AS/400) systems play critical role in the business processes of their owners. However, security testing and monitoring of these systems usually doesn’t achieve the level we expect in case of Windows, Linux or Unix hosts.

Silent Signal’s proprietary iCompliant tool helps the secure operation and hardening of IBM i systems to minimize the attack surface. To satisfy the need of in-depth IBM i security assessments, the knowledge integrated into iCompliant is based on multiple pillars:

 

iCompliant applies this knowledge to examine the overall security posture of its target systems, and deliver comprehensive results about weaknesses to remediate and settings to improve.

 

Title page

Executive summary (1)

Executive summary (2)

Table of contents (1)

Table of contents (2)

Example of failed audit items (1)

Example of failed audit items (2)

Example of warning-level audit items (1)

Example of warning-level audit items (2)

Example of passed audit items

Click on the images below to view screenshots from the report.

 

FAQs

While iCompliant can be used to ensure compliance to best practices defined by organizations like CIS or IBM, the primary goal of the software is to provide practical guidance to implement defensive practices against all phases of the intrusion kill chain.
In its base configuration, iCompliant's knowledge-base incorporate hands-on experience from pentest projects and research to refine recommendations and prioritization.

Examples:

  • While some API's are accessible for all users by design, iCompliant checks hardened access controls since these API's are commonly used in privilege escalation exploits.
  • iCompliant provides information for local and remote attack surface reduction.

iCompliant is not a monitoring tool and it's not meant to provide real-time data. Some audit items check the state of large numbers of objects, that can take some time. For this reason, audit items are usually grouped so quick checks are executed more frequently, while heavier audits only run when load is low.

Examples:

  • A scheduled task can check system values every hour, while authorities on file objects are only checked once a month.
  • Select audit items can be executed on demand, e.g. after significant configuration updates.

Exit programs are important components of defense, but they are not silver bullets: not every interface can be protected by Exit Programs, and some vulnerabilities may be reached through allowed transactions. The principle of defense-in-depth dictates that we should anticipate that some of our controls fails, so we need to harden our systems in multiple layers.

Example:

  • Vulnerabilities of third-party applications generally can't be mitigated with Exit Programs.

Modern attacks commonly start from inside the corporate perimeter, exploiting client-side vulnerabilities or abusing human trust. Considering the frequency of incidents involving internal systems in general, the lack of data about IBM i systems only suggests that the industry simply doesn't have the means to detect such incidents.

Example:

iCompliant is meant to be executed on external workstations or servers, and doesn't require extra software to be installed on the target IBM i systems.

Examples:

  • A scheduled task on a Linux server can periodically generate reports about IBM i systems.
  • SOC analysts can execute inidividual checks for human review from their Windows workstations.

Aside of standard integrations (Excel and JSON export; Jira integration) iCompliant can be extended so that it can support arbitrary export formats and API's. Contact us for a custom extension quote!

Examples:

  • Custom exporters can be created that can push results via a REST API.
  • Default JSON output can be transformed with standard tools to be loaded to any JSON-compatible ingestor.

iCompliant, as a framework allows creating custom audit items and fine-tuning results so they match the unique expectations and requirements of the target systems. Relevant audit items can be selected according to security requirements.

Examples:

  • Custom audit items can be created that check if critical business objects (files, data tables, source physical files, etc.) are only accessible by specific users of the company.
  • Verification of custom corporate password policy enforcement can be integrated to regular compliance checks.

Our customers can extend iCompliant with new audit items without limitation or additional cost. New audit items can be added by creating configuration files in an easy to understand, and fully documented format.
If creating audit items in-house is not an option for you, custom audit item development services are available - please contact us for more information about custom development services!

Subscriptions cover year-long periods, during which relevant updates and releases are delivered to customers. Subscription licenses are limited by the number of target IBM i systems iCompliant would work on.

Subscriptions cover year-long periods, during which all updates and new releases are delivered to customers. All plans include unlimited scans and cover all current and future test cases released during the subscription period.

Starter Professional Enterprise Scan as a Service
LPAR limit Up to 3 LPARs Unlimited Unlimited N/A
Scans per year Unlimited Unlimited Unlimited 2× per year
Report format Standard Standard Custom-branded Custom-branded
Custom check development included 5 days
Additional check development €1,500 / day €1,500 / day €1,000 / day €1,500 / day
Support Email Email + priority Dedicated contact Dedicated contact
Who runs the scans You You You Silent Signal (remote)
Annual price €12,000 €30,000 €36,000 €12,000

All prices for services performed by Silent Signal are based on remote execution via a network connection provided by the customer. On-site engagements are available on request and quoted separately.

Custom Check Development

Every organization has unique security policies, internal compliance requirements, or configurations that no off-the-shelf tool covers. iCompliant supports fully custom audit checks written specifically for your environment — your policies, your baselines, your rules.

Custom checks are developed by Silent Signal's IBM i security team based on your specifications, scoped jointly before work begins, and delivered as signed, versioned check packages that integrate seamlessly into your existing iCompliant deployment.

Development is priced per day of work. The Enterprise plan includes 5 development days; additional days can be purchased at the rates listed above. Custom check development days may only be used for audit check development. For other custom development needs — such as output formats, connectors, or integrations — please contact us for a separate quote.

Scan as a Service

Don't have the internal resources to run iCompliant yourself — or simply want a point-in-time security assessment without committing to an annual license? With our Scan as a Service offering, Silent Signal handles everything: deployment, execution, and report delivery. You receive a full iCompliant report for each of your covered systems, twice a year, with no software to install or maintain on your side. All work is performed remotely via a network connection provided by the customer.

This option is also popular ahead of audits, certifications, or M&A due diligence processes where an independent assessment of IBM i infrastructure is required.

Pilot Assessment — €2,000 (1 LPAR)

Want to see what iCompliant finds on your system before committing to a license? We run a focused scan covering the ~20 most critical pentest-based checks — the attack paths and misconfigurations that generic compliance tools don't look for — on a single LPAR of your choice, and deliver the full report. The scan is run by you using iCompliant; Silent Signal provides setup guidance and a 1-hour results review session.

If you decide to purchase a license within 30 days, the €1,500 is credited toward your first year.

Prices listed excluding VAT. Annual licenses are invoiced upfront. Multi-year discounts available on request. Contact us for custom licensing options.

Silent Signal performs unique security research focused on IBM i to uncover previously unknown vulnerabilities of the platform and Independent Software Vendors of the IBM i platform.
iCompliant Exclusive Vulnerability Feed provides access to the information uncovered by this research activity, so customers can mitigate vulnerabilities even before vendor fixes become available. The vulnerability feed subscription is available for select iCompliant Base Subscription customers at different levels:

Level 40 – 0-day Vulnerability Detection

In addition to the information provided in Level 0, customers receive Audit Items, so information about affected software can be collected automatically using the iCompliant framework.
Just like in case of any other Audit Item provided by Silent Signal, 0-day detection items will produce mitigation guidance as part of the final report if a vulnerability with no official patch is detected.

Level 50 – 0-day Vulnerability Demonstration

In addition to the items covered in Level 30 and Level 40, Level 50 subscription includes a demonstration attempt for any vulnerability included in the feed, on systems covered by the Base Subscription.
Demonstrations are performed by Silent Signal senior experts over remote network connections provided by the customer during agreed upon time frames.

The core IBM i and popular applications of Independent Software Vendors are included in the Exclusive Vulnerability Feed.

Example:

  • Your company uses a popular Exit Point Manager. With EVF Level 40 you get information about vulnerabilities that may affect this software and mitigation guidance before vendor patches are available.

Our basic support for iCompliant includes:

  • Communication via e-mail
  • 8x5 support hours (CET/CEST timezone)
  • Next business day response to initial report

For additional support options please contact us!

The problem of ransomware is not an IBM i specific problem that primarly affects IBM i systems at the integration points with the wider corporate infrastructure. For this reason, defending against ransomware requires strategies reaching over all platforms present in an organization. iCompliant contributes to the solution on the IBM i platform by attack surface reduction and verification of access controls.

Request a demo