Code Security on IBM i

Code Security on IBM i (aka AS/400 or AS400)

How to use CVEs to secure your IBM i application?

For six years, security has been the top concern for IBM i shops. Despite IBM i being one of the most secure platforms, modernization and integration with external apps and devices expose new risks like SQL injection and unsafe APIs. As IBM i applications evolve into web or microservices, a new level of security rigor is essential to protect these valuable assets.

What are CVEs and how do they apply to IBM i applications?

To help organizations face growing security risks, the Common Vulnerabilities and Exposures (CVE) nonprofit program was launched to catalog software vulnerabilities into a public and freely available “dictionary”. Each CVE lists a specific vulnerability or exposure and uses a Common Vulnerability Scoring System (CVSS) is used to evaluate the ‘threat level’.

Each vulnerability is assigned a CVSS base score between 0.0 and 10.0 — a score of 0.0 represents no risk and 9.0 – 10.0 is a critical risk score..

How to identify these security risks?

DevSecOps has made security a shared responsibility throughout the entire IT lifecycle. Continuous security checks are now built-in to the application development process.

Designed specifically for IBM i, ARCAD CodeChecker is a key element of any DevSecOps implementation. The tool automates the detection of security vulnerabilities in RPG and CL code. It acts as a standalone ‘quality gate’ that can plug into any DevOps cycle.

ARCAD CodeChecker integrates with RDi making it easy for developers to check for security flaws as they code. You can also use it with Jenkins to automate standard IBM i security checks withing a standard CI/CD pipeline.

How does ARCAD CodeChecker work?

ARCAD CodeChecker works by analyzing source code against a set of rules, metrics, and metric models. Industry standard rules are provided out of the box which can be customized or enhanced for local requirements. Each security rule in ARCAD CodeChecker maps through to a single or multiple CVEs, or in some cases be independent of any CVE.

ARCAD CodeChecker reports on how your source code complies with, or violates, the rules defined. To help you assess your level of vulnerability or exposure and learn the appropriate corrective measures to apply, ARCAD CodeChecker also documents each rule violation, including:

  • description of the risk

  • examples of compliant and non-compliant code

  • an assessment of whether you are “exposed to risk”

  • direct links through to the related CVE descriptions on the CVE® Program website

ARCAD CodeChecker Compliant & Non compliant code

How to report on security risks in your IBM i application?

ARCAD CodeChecker generates a campaign results report, organized by severity. According to the rulesets you have chosen for your campaign, the results report will deliver a high-level, summary view of the quality violations and security vulnerabilities identified.

ARCAD CodeChecker Campaign Results

Click from the report to specific rule documentation to understand the cause of the violation and the recommended course of action, including external CVE links.

The security results report gives an easy and rapid way to determine “am I at risk?” and prove your compliance to both industry-wide and local coding standards on IBM i.

How can I anticipate the security risks I face?

To help you learn more about new security risks – ARCAD CodeChecker allows easy browsing of rule documentation, categorized by rule set.

ARCAD CodeChecker Rule Set

Using ARCAD CodeChecker rule documentation, developers can rapidly inform themselves of coding best practices on IBM i and the constructs to avoid.

Thanks to the specific IBM i knowledge contained within ARCAD CodeChecker and the quick links to external CVEs, organizations can rapidly take preventive action to safeguard the security of their business-critical IBM i source code and data.

Get ARCAD CodeChecker!

Picto ARCAD CodeChecker

ARCAD CodeChecker

Identify quality defects and security risks in your IBM i code

Safeguard application security on IBM i

  • DevSecOps: detects SQL injections, vulnerable APIs, and dynamic SQL

  • Over 100 customizable rules for code quality checking on IBM i

  • Reduce code complexity and the risk of downtime

  • Keep maintenance cost and timescales under control

  • Ease the onboarding of new developers

  • Supports code audit and continuous quality monitoring

  • Standalone solution that can be used with any DevOps tools on IBM i

  • Integrates with RDi, Jenkins, and SonarQube for dashboarding

Contact Us

REQUEST A DEMO

Let’s talk about your project!

Speak with an expert

Customized Demo

Contact our experts