SlideShare uma empresa Scribd logo
1 de 11
IBM Cognos® Security Best
Practices	
  

Wisconsin User Group, March 2014





Kirk Wiseman
PerformanceG2, Inc.
Agenda
!   Authentication versus Authorization
!   Overview Cognos Security
!   Best Practices
!   Questions
Authentication vs Authorization
!  	
  Cognos	
  security	
  is	
  based	
  on	
  authen2ca2on	
  and	
  authoriza2on	
  
!  	
  Authen2ca2on	
  -­‐-­‐	
  	
  You	
  are	
  who	
  you	
  say	
  you	
  are.	
  
!  	
  Authoriza2on	
  –	
  What	
  you	
  can	
  or	
  cannot	
  do.	
  
!  	
  Authen2ca2on	
  is	
  handled	
  by	
  a	
  3rd	
  party	
  security	
  tool	
  such	
  as	
  Ac2ve	
  Directory	
  LDAP	
  or	
  
	
  OpenLDAP	
  
!  	
  Authoriza2on	
  is	
  handled	
  through	
  Cognos	
  using	
  groups,	
  roles,	
  capabili2es	
  and	
  
	
  permissions	
  	
  
Cognos Security Overview
!  	
  Namespaces	
  
!  	
  External	
  Authen2ca2on	
  providers	
  are	
  set	
  up	
  as	
  namespaces	
  in	
  Cognos	
  
!  	
  Cognos	
  Namespace	
  	
  
!  A	
  built-­‐in	
  namespace	
  that	
  provides	
  pre-­‐defined	
  security	
  entries,	
  including:	
  
	
  groups,	
  roles,	
  data	
  sources,	
  distribu2on	
  lists	
  and	
  contacts	
  
!  	
  Cannot	
  be	
  deleted	
  
!  	
  Cognos	
  groups	
  and	
  roles	
  are	
  op2onal	
  
!  	
  Cognos	
  Applica2on	
  Firewall	
  (CAF)	
  
!  	
  Acts	
  as	
  a	
  smart	
  proxy	
  for	
  the	
  gateways	
  and	
  dispatchers	
  
!  	
  Analyses,	
  Modifies	
  and	
  validates	
  HTTP	
  and	
  XML	
  requests	
  
!  	
  Prevents	
  Malicious	
  code	
  from	
  being	
  inserted	
  
!  	
  Turned	
  on	
  by	
  default	
  –	
  LEAVE	
  IT	
  ON!	
  
	
  
Cognos Security Best Practices
!  	
  Immediately	
  aVer	
  install	
  and	
  configura2on:	
  
!  Turn	
  off	
  anonymous	
  access	
  and	
  enable	
  an	
  external	
  authen2ca2on	
  provider	
  
!  	
  Add	
  at	
  least	
  two	
  groups	
  of	
  administrators	
  to	
  the	
  Cognos	
  System	
  Administrator	
  
	
  group.	
  
!  	
  Remove	
  the	
  Cognos	
  Everyone	
  Group	
  from	
  Everything	
  
!  	
  Plan	
  your	
  security	
  sooner	
  rather	
  than	
  later	
  
!  	
  Plan	
  it	
  out	
  on	
  paper,	
  excel,	
  etc.	
  first	
  
!  	
  Decide	
  whether	
  you	
  are	
  going	
  to	
  u2lize	
  the	
  op2onal	
  Cognos	
  Groups	
  and	
  Roles,	
  Your	
  
	
  Authen2ca2on	
  provider’s	
  groups	
  or	
  a	
  combina2on	
  of	
  both.	
  
!  	
  Set	
  up	
  capabili2es	
  early	
  
!  	
  Create	
  your	
  folder	
  structure	
  early	
  and	
  set	
  permissions	
  using	
  allow	
  
!  	
  Use	
  DENY	
  sparingly,	
  if	
  at	
  all!!	
  	
  
!  	
  	
  Set	
  up	
  test	
  users	
  and	
  test	
  each	
  and	
  every	
  scenario.	
  
	
  
Cognos Security Best Practices
!  	
  If	
  se]ng	
  up	
  Single	
  Sign-­‐on	
  do	
  it	
  aVer	
  all	
  other	
  tes2ng	
  has	
  been	
  accomplished	
  
!  	
  If	
  access	
  is	
  to	
  be	
  given	
  outside	
  of	
  the	
  company’s	
  firewall	
  then	
  set	
  up	
  SSL	
  
!  	
  Set	
  the	
  Valid	
  domains	
  op2on	
  
!  	
  Maintain	
  a	
  security	
  process	
  document	
  for	
  your	
  organiza2on	
  
A little bit about Permissions
!  	
  Read	
  
!  	
  View	
  all	
  proper2es	
  of	
  an	
  entry,	
  including	
  report	
  specs,	
  report	
  output,	
  etc.	
  
!  	
  Write	
  
!  	
  Modify	
  proper2es	
  of	
  a	
  report	
  
!  	
  Delete	
  an	
  entry	
  
!  	
  Create	
  entries	
  
!  	
  Modify	
  reports	
  
!  	
  Create	
  new	
  outputs	
  
!  	
  Execute	
  
!  	
  Reports,	
  agents,	
  etc	
  can	
  be	
  run.	
  	
  	
  
!  	
  Data	
  Sources	
  can	
  retrieve	
  data.	
  
!  	
  Set	
  Policy	
  
!  	
  Read	
  and	
  modify	
  security	
  se]ngs	
  
!  	
  Traverse	
  
!  The	
  ability	
  to	
  see	
  through	
  an	
  object	
  to	
  its	
  children.	
  	
  
	
  
Permission Examples
Ac#on	
   Permissions	
  Required	
  
Add	
  an	
  entry	
   Write	
  permissions	
  for	
  a	
  parent	
  entry	
  
Query	
  the	
  entry	
  proper#es	
   Read	
  permissions	
  for	
  an	
  entry	
  
View	
  the	
  children	
  of	
  the	
  entry	
   Traverse	
  permissions	
  for	
  an	
  entry	
  
Update	
  an	
  entry	
   Write	
  permissions	
  for	
  an	
  entry	
  
Delete	
  an	
  entry	
   Write	
  permissions	
  for	
  an	
  entry,	
  and	
  write	
  permissions	
  for	
  a	
  
parent	
  entry	
  
Copy	
  an	
  entry	
   Read	
  permissions	
  for	
  an	
  entry	
  and	
  any	
  child	
  entries,	
  traverse	
  
permissions	
  for	
  all	
  of	
  the	
  children,	
  and	
  write	
  and	
  traverse	
  
permissions	
  for	
  the	
  target	
  parent	
  entry	
  
Move	
  an	
  entry	
   Read	
  and	
  write	
  permissions	
  for	
  an	
  entry,	
  write	
  permissions	
  
for	
  both	
  the	
  source	
  parent	
  entry	
  and	
  the	
  target	
  parent	
  entry,	
  
and	
  traverse	
  permissions	
  for	
  the	
  target	
  parent	
  entry	
  
9/2/09	
  
Questions?
Connect with us
!  Call us: 877.742.4276
!  	
  Email us: training@performanceg2.com, info@performanceg2.com
!  	
  Visit our web site: performanceg2.com
!  	
  Watch our Cognos videos at: youtube.com/performanceg2
!  	
  Follow us: twitter.com/performanceg2
!  	
  Read our blog
!  	
  Upcoming events
!  Upcoming training
Thank you for attending!
training@performanceg2.com	
  

Mais conteúdo relacionado

Mais procurados

4 . future uni presentation
4 . future uni presentation4 . future uni presentation
4 . future uni presentationRashid Khatmey
 
Android Security & Penetration Testing
Android Security & Penetration TestingAndroid Security & Penetration Testing
Android Security & Penetration TestingSubho Halder
 
Owasp top 10 web application security hazards part 2
Owasp top 10 web application security hazards part 2Owasp top 10 web application security hazards part 2
Owasp top 10 web application security hazards part 2Abhinav Sejpal
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresAung Thu Rha Hein
 
Identity theft: Developers are key - JFokus 2017
Identity theft: Developers are key - JFokus 2017Identity theft: Developers are key - JFokus 2017
Identity theft: Developers are key - JFokus 2017Brian Vermeer
 
Bypass Security Checking with Frida
Bypass Security Checking with FridaBypass Security Checking with Frida
Bypass Security Checking with FridaSatria Ady Pradana
 
My Null Android Penetration Session
My Null  Android Penetration Session My Null  Android Penetration Session
My Null Android Penetration Session Avinash Sinha
 
From Reversing to Exploitation
From Reversing to ExploitationFrom Reversing to Exploitation
From Reversing to ExploitationSatria Ady Pradana
 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & TestingDeepu S Nath
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017TriNimbus
 
Attacking android insecurity
Attacking android insecurityAttacking android insecurity
Attacking android insecurityGodfrey Nolan
 
Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android ApplicationsCláudio André
 
Owasp top 10 web application security hazards - Part 1
Owasp top 10 web application security hazards - Part 1Owasp top 10 web application security hazards - Part 1
Owasp top 10 web application security hazards - Part 1Abhinav Sejpal
 
10 Mistakes Hackers Want You to Make
10 Mistakes Hackers Want You to Make10 Mistakes Hackers Want You to Make
10 Mistakes Hackers Want You to MakeJoe Kutner
 
Using Proxies To Secure Applications And More
Using Proxies To Secure Applications And MoreUsing Proxies To Secure Applications And More
Using Proxies To Secure Applications And MoreJosh Sokol
 
[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security WorkshopOWASP
 
Intro to Wordpress Security
Intro to Wordpress SecurityIntro to Wordpress Security
Intro to Wordpress SecurityChris Dodds
 

Mais procurados (20)

2 . web app s canners
2 . web app s canners2 . web app s canners
2 . web app s canners
 
4 . future uni presentation
4 . future uni presentation4 . future uni presentation
4 . future uni presentation
 
Android Security & Penetration Testing
Android Security & Penetration TestingAndroid Security & Penetration Testing
Android Security & Penetration Testing
 
Owasp top 10 web application security hazards part 2
Owasp top 10 web application security hazards part 2Owasp top 10 web application security hazards part 2
Owasp top 10 web application security hazards part 2
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & Countermeasures
 
Identity theft: Developers are key - JFokus 2017
Identity theft: Developers are key - JFokus 2017Identity theft: Developers are key - JFokus 2017
Identity theft: Developers are key - JFokus 2017
 
Bypass Security Checking with Frida
Bypass Security Checking with FridaBypass Security Checking with Frida
Bypass Security Checking with Frida
 
My Null Android Penetration Session
My Null  Android Penetration Session My Null  Android Penetration Session
My Null Android Penetration Session
 
Web tools ppt
Web tools pptWeb tools ppt
Web tools ppt
 
From Reversing to Exploitation
From Reversing to ExploitationFrom Reversing to Exploitation
From Reversing to Exploitation
 
Web application security & Testing
Web application security  & TestingWeb application security  & Testing
Web application security & Testing
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017
 
Attacking android insecurity
Attacking android insecurityAttacking android insecurity
Attacking android insecurity
 
Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android Applications
 
Owasp top 10 web application security hazards - Part 1
Owasp top 10 web application security hazards - Part 1Owasp top 10 web application security hazards - Part 1
Owasp top 10 web application security hazards - Part 1
 
10 Mistakes Hackers Want You to Make
10 Mistakes Hackers Want You to Make10 Mistakes Hackers Want You to Make
10 Mistakes Hackers Want You to Make
 
Bulletproof
BulletproofBulletproof
Bulletproof
 
Using Proxies To Secure Applications And More
Using Proxies To Secure Applications And MoreUsing Proxies To Secure Applications And More
Using Proxies To Secure Applications And More
 
[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop
 
Intro to Wordpress Security
Intro to Wordpress SecurityIntro to Wordpress Security
Intro to Wordpress Security
 

Semelhante a IBM Cognos 10.2 Security Best Practices

Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Brian Huff
 
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Intro to Security Analytics MethodsSplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Intro to Security Analytics MethodsSplunk
 
Unit Testing Documentum Foundation Classes Code
Unit Testing Documentum Foundation Classes CodeUnit Testing Documentum Foundation Classes Code
Unit Testing Documentum Foundation Classes CodeBlueFish
 
Low Hanging Fruit, Making Your Basic MongoDB Installation More Secure
Low Hanging Fruit, Making Your Basic MongoDB Installation More SecureLow Hanging Fruit, Making Your Basic MongoDB Installation More Secure
Low Hanging Fruit, Making Your Basic MongoDB Installation More SecureMongoDB
 
Unit Testing DFC
Unit Testing DFCUnit Testing DFC
Unit Testing DFCBlueFish
 
DevSecCon Singapore 2018 - Remove developers’ shameful secrets or simply rem...
DevSecCon Singapore 2018 -  Remove developers’ shameful secrets or simply rem...DevSecCon Singapore 2018 -  Remove developers’ shameful secrets or simply rem...
DevSecCon Singapore 2018 - Remove developers’ shameful secrets or simply rem...DevSecCon
 
Securing Source Code on Endpoints
Securing Source Code on EndpointsSecuring Source Code on Endpoints
Securing Source Code on Endpointsthomashelsley
 
BsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devopsBsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devopsJames '​-- Mckinlay
 
Configuration Tips to Reduce the Risk of IBM i Malware Infection
Configuration Tips to Reduce the Risk of IBM i Malware InfectionConfiguration Tips to Reduce the Risk of IBM i Malware Infection
Configuration Tips to Reduce the Risk of IBM i Malware InfectionPrecisely
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxFernandoVizer
 
It's a Dangerous World
It's a Dangerous World It's a Dangerous World
It's a Dangerous World MongoDB
 
Globodox Document Management Software
Globodox Document Management SoftwareGlobodox Document Management Software
Globodox Document Management SoftwareZ. Ahmed
 
Globodox document management solution
Globodox document management solutionGlobodox document management solution
Globodox document management solutionWajira De Silva
 
Thick Application Penetration Testing: Crash Course
Thick Application Penetration Testing: Crash CourseThick Application Penetration Testing: Crash Course
Thick Application Penetration Testing: Crash CourseScott Sutherland
 
AWS re:Invent 2016: Store and collaborate on content securely with Amazon Wor...
AWS re:Invent 2016: Store and collaborate on content securely with Amazon Wor...AWS re:Invent 2016: Store and collaborate on content securely with Amazon Wor...
AWS re:Invent 2016: Store and collaborate on content securely with Amazon Wor...Amazon Web Services
 
SplunkLive! Munich 2018: Intro to Security Analytics Methods
SplunkLive! Munich 2018: Intro to Security Analytics MethodsSplunkLive! Munich 2018: Intro to Security Analytics Methods
SplunkLive! Munich 2018: Intro to Security Analytics MethodsSplunk
 
DevSecCon SG 2018 Fabian Presentation Slides
DevSecCon SG 2018 Fabian Presentation SlidesDevSecCon SG 2018 Fabian Presentation Slides
DevSecCon SG 2018 Fabian Presentation SlidesFab L
 
Sai devops - the art of being specializing generalist
Sai   devops - the art of being specializing generalistSai   devops - the art of being specializing generalist
Sai devops - the art of being specializing generalistOdd-e
 

Semelhante a IBM Cognos 10.2 Security Best Practices (20)

Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)
 
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Intro to Security Analytics MethodsSplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
SplunkLive! Frankfurt 2018 - Intro to Security Analytics Methods
 
Unit Testing Documentum Foundation Classes Code
Unit Testing Documentum Foundation Classes CodeUnit Testing Documentum Foundation Classes Code
Unit Testing Documentum Foundation Classes Code
 
Low Hanging Fruit, Making Your Basic MongoDB Installation More Secure
Low Hanging Fruit, Making Your Basic MongoDB Installation More SecureLow Hanging Fruit, Making Your Basic MongoDB Installation More Secure
Low Hanging Fruit, Making Your Basic MongoDB Installation More Secure
 
Unit Testing DFC
Unit Testing DFCUnit Testing DFC
Unit Testing DFC
 
DevSecCon Singapore 2018 - Remove developers’ shameful secrets or simply rem...
DevSecCon Singapore 2018 -  Remove developers’ shameful secrets or simply rem...DevSecCon Singapore 2018 -  Remove developers’ shameful secrets or simply rem...
DevSecCon Singapore 2018 - Remove developers’ shameful secrets or simply rem...
 
Securing Source Code on Endpoints
Securing Source Code on EndpointsSecuring Source Code on Endpoints
Securing Source Code on Endpoints
 
BsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devopsBsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devops
 
Configuration Tips to Reduce the Risk of IBM i Malware Infection
Configuration Tips to Reduce the Risk of IBM i Malware InfectionConfiguration Tips to Reduce the Risk of IBM i Malware Infection
Configuration Tips to Reduce the Risk of IBM i Malware Infection
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
 
Dev{sec}ops
Dev{sec}opsDev{sec}ops
Dev{sec}ops
 
It's a Dangerous World
It's a Dangerous World It's a Dangerous World
It's a Dangerous World
 
Globodox Document Management Software
Globodox Document Management SoftwareGlobodox Document Management Software
Globodox Document Management Software
 
Globodox document management solution
Globodox document management solutionGlobodox document management solution
Globodox document management solution
 
Thick Application Penetration Testing: Crash Course
Thick Application Penetration Testing: Crash CourseThick Application Penetration Testing: Crash Course
Thick Application Penetration Testing: Crash Course
 
AWS re:Invent 2016: Store and collaborate on content securely with Amazon Wor...
AWS re:Invent 2016: Store and collaborate on content securely with Amazon Wor...AWS re:Invent 2016: Store and collaborate on content securely with Amazon Wor...
AWS re:Invent 2016: Store and collaborate on content securely with Amazon Wor...
 
SplunkLive! Munich 2018: Intro to Security Analytics Methods
SplunkLive! Munich 2018: Intro to Security Analytics MethodsSplunkLive! Munich 2018: Intro to Security Analytics Methods
SplunkLive! Munich 2018: Intro to Security Analytics Methods
 
App locker
App lockerApp locker
App locker
 
DevSecCon SG 2018 Fabian Presentation Slides
DevSecCon SG 2018 Fabian Presentation SlidesDevSecCon SG 2018 Fabian Presentation Slides
DevSecCon SG 2018 Fabian Presentation Slides
 
Sai devops - the art of being specializing generalist
Sai   devops - the art of being specializing generalistSai   devops - the art of being specializing generalist
Sai devops - the art of being specializing generalist
 

Mais de PerformanceG2, Inc.

Introduction to Simulation- Predictive Analytics
Introduction to Simulation- Predictive AnalyticsIntroduction to Simulation- Predictive Analytics
Introduction to Simulation- Predictive AnalyticsPerformanceG2, Inc.
 
An Introduction to Predictive Analytics- An Executive's Guide for Informed De...
An Introduction to Predictive Analytics- An Executive's Guide for Informed De...An Introduction to Predictive Analytics- An Executive's Guide for Informed De...
An Introduction to Predictive Analytics- An Executive's Guide for Informed De...PerformanceG2, Inc.
 
IBM Cognos Insight the Book - An In Depth Presenation by Author Sanjeev Datta
IBM Cognos Insight the Book - An In Depth Presenation by Author Sanjeev DattaIBM Cognos Insight the Book - An In Depth Presenation by Author Sanjeev Datta
IBM Cognos Insight the Book - An In Depth Presenation by Author Sanjeev DattaPerformanceG2, Inc.
 
Business Intelligence for Government - Clark County Family Services Departmen...
Business Intelligence for Government - Clark County Family Services Departmen...Business Intelligence for Government - Clark County Family Services Departmen...
Business Intelligence for Government - Clark County Family Services Departmen...PerformanceG2, Inc.
 
PerformanceG2 Cognos Training Course Catalog 2011
PerformanceG2 Cognos Training Course Catalog 2011PerformanceG2 Cognos Training Course Catalog 2011
PerformanceG2 Cognos Training Course Catalog 2011PerformanceG2, Inc.
 
Performance Management: An Investment in Enterprise Success
Performance Management: An Investment in Enterprise SuccessPerformance Management: An Investment in Enterprise Success
Performance Management: An Investment in Enterprise SuccessPerformanceG2, Inc.
 
PG2 Multi Dimensional Reporting using Report Studio
PG2 Multi Dimensional Reporting using Report StudioPG2 Multi Dimensional Reporting using Report Studio
PG2 Multi Dimensional Reporting using Report StudioPerformanceG2, Inc.
 
PG2 Cognos TM1: An Introduction to Design, Maintenance and Performance Tuning
PG2 Cognos TM1: An Introduction to Design, Maintenance and Performance TuningPG2 Cognos TM1: An Introduction to Design, Maintenance and Performance Tuning
PG2 Cognos TM1: An Introduction to Design, Maintenance and Performance TuningPerformanceG2, Inc.
 
PG2 Creating Effective Dashboards In Cognos 8
PG2 Creating Effective Dashboards In Cognos 8PG2 Creating Effective Dashboards In Cognos 8
PG2 Creating Effective Dashboards In Cognos 8PerformanceG2, Inc.
 

Mais de PerformanceG2, Inc. (14)

Introduction to Simulation- Predictive Analytics
Introduction to Simulation- Predictive AnalyticsIntroduction to Simulation- Predictive Analytics
Introduction to Simulation- Predictive Analytics
 
Predictive Analytics Modeling
Predictive Analytics ModelingPredictive Analytics Modeling
Predictive Analytics Modeling
 
An Introduction to Predictive Analytics- An Executive's Guide for Informed De...
An Introduction to Predictive Analytics- An Executive's Guide for Informed De...An Introduction to Predictive Analytics- An Executive's Guide for Informed De...
An Introduction to Predictive Analytics- An Executive's Guide for Informed De...
 
IBM Cognos Insight the Book - An In Depth Presenation by Author Sanjeev Datta
IBM Cognos Insight the Book - An In Depth Presenation by Author Sanjeev DattaIBM Cognos Insight the Book - An In Depth Presenation by Author Sanjeev Datta
IBM Cognos Insight the Book - An In Depth Presenation by Author Sanjeev Datta
 
IBM Cognos 10 - An Introduction
IBM Cognos 10 - An IntroductionIBM Cognos 10 - An Introduction
IBM Cognos 10 - An Introduction
 
Business Intelligence for Government - Clark County Family Services Departmen...
Business Intelligence for Government - Clark County Family Services Departmen...Business Intelligence for Government - Clark County Family Services Departmen...
Business Intelligence for Government - Clark County Family Services Departmen...
 
PerformanceG2 Company Profile
PerformanceG2 Company ProfilePerformanceG2 Company Profile
PerformanceG2 Company Profile
 
PerformanceG2 Cognos Training Course Catalog 2011
PerformanceG2 Cognos Training Course Catalog 2011PerformanceG2 Cognos Training Course Catalog 2011
PerformanceG2 Cognos Training Course Catalog 2011
 
Performance Management: An Investment in Enterprise Success
Performance Management: An Investment in Enterprise SuccessPerformance Management: An Investment in Enterprise Success
Performance Management: An Investment in Enterprise Success
 
PG2 Multi Dimensional Reporting using Report Studio
PG2 Multi Dimensional Reporting using Report StudioPG2 Multi Dimensional Reporting using Report Studio
PG2 Multi Dimensional Reporting using Report Studio
 
Cognos TM1 for Advanced Users
Cognos TM1 for Advanced UsersCognos TM1 for Advanced Users
Cognos TM1 for Advanced Users
 
PG2 Cognos Express 101
PG2 Cognos Express 101PG2 Cognos Express 101
PG2 Cognos Express 101
 
PG2 Cognos TM1: An Introduction to Design, Maintenance and Performance Tuning
PG2 Cognos TM1: An Introduction to Design, Maintenance and Performance TuningPG2 Cognos TM1: An Introduction to Design, Maintenance and Performance Tuning
PG2 Cognos TM1: An Introduction to Design, Maintenance and Performance Tuning
 
PG2 Creating Effective Dashboards In Cognos 8
PG2 Creating Effective Dashboards In Cognos 8PG2 Creating Effective Dashboards In Cognos 8
PG2 Creating Effective Dashboards In Cognos 8
 

Último

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Último (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

IBM Cognos 10.2 Security Best Practices

  • 1. IBM Cognos® Security Best Practices   Wisconsin User Group, March 2014 Kirk Wiseman PerformanceG2, Inc.
  • 2. Agenda !   Authentication versus Authorization !   Overview Cognos Security !   Best Practices !   Questions
  • 3. Authentication vs Authorization !    Cognos  security  is  based  on  authen2ca2on  and  authoriza2on   !    Authen2ca2on  -­‐-­‐    You  are  who  you  say  you  are.   !    Authoriza2on  –  What  you  can  or  cannot  do.   !    Authen2ca2on  is  handled  by  a  3rd  party  security  tool  such  as  Ac2ve  Directory  LDAP  or    OpenLDAP   !    Authoriza2on  is  handled  through  Cognos  using  groups,  roles,  capabili2es  and    permissions    
  • 4. Cognos Security Overview !    Namespaces   !    External  Authen2ca2on  providers  are  set  up  as  namespaces  in  Cognos   !    Cognos  Namespace     !  A  built-­‐in  namespace  that  provides  pre-­‐defined  security  entries,  including:    groups,  roles,  data  sources,  distribu2on  lists  and  contacts   !    Cannot  be  deleted   !    Cognos  groups  and  roles  are  op2onal   !    Cognos  Applica2on  Firewall  (CAF)   !    Acts  as  a  smart  proxy  for  the  gateways  and  dispatchers   !    Analyses,  Modifies  and  validates  HTTP  and  XML  requests   !    Prevents  Malicious  code  from  being  inserted   !    Turned  on  by  default  –  LEAVE  IT  ON!    
  • 5. Cognos Security Best Practices !    Immediately  aVer  install  and  configura2on:   !  Turn  off  anonymous  access  and  enable  an  external  authen2ca2on  provider   !    Add  at  least  two  groups  of  administrators  to  the  Cognos  System  Administrator    group.   !    Remove  the  Cognos  Everyone  Group  from  Everything   !    Plan  your  security  sooner  rather  than  later   !    Plan  it  out  on  paper,  excel,  etc.  first   !    Decide  whether  you  are  going  to  u2lize  the  op2onal  Cognos  Groups  and  Roles,  Your    Authen2ca2on  provider’s  groups  or  a  combina2on  of  both.   !    Set  up  capabili2es  early   !    Create  your  folder  structure  early  and  set  permissions  using  allow   !    Use  DENY  sparingly,  if  at  all!!     !      Set  up  test  users  and  test  each  and  every  scenario.    
  • 6. Cognos Security Best Practices !    If  se]ng  up  Single  Sign-­‐on  do  it  aVer  all  other  tes2ng  has  been  accomplished   !    If  access  is  to  be  given  outside  of  the  company’s  firewall  then  set  up  SSL   !    Set  the  Valid  domains  op2on   !    Maintain  a  security  process  document  for  your  organiza2on  
  • 7. A little bit about Permissions !    Read   !    View  all  proper2es  of  an  entry,  including  report  specs,  report  output,  etc.   !    Write   !    Modify  proper2es  of  a  report   !    Delete  an  entry   !    Create  entries   !    Modify  reports   !    Create  new  outputs   !    Execute   !    Reports,  agents,  etc  can  be  run.       !    Data  Sources  can  retrieve  data.   !    Set  Policy   !    Read  and  modify  security  se]ngs   !    Traverse   !  The  ability  to  see  through  an  object  to  its  children.      
  • 8. Permission Examples Ac#on   Permissions  Required   Add  an  entry   Write  permissions  for  a  parent  entry   Query  the  entry  proper#es   Read  permissions  for  an  entry   View  the  children  of  the  entry   Traverse  permissions  for  an  entry   Update  an  entry   Write  permissions  for  an  entry   Delete  an  entry   Write  permissions  for  an  entry,  and  write  permissions  for  a   parent  entry   Copy  an  entry   Read  permissions  for  an  entry  and  any  child  entries,  traverse   permissions  for  all  of  the  children,  and  write  and  traverse   permissions  for  the  target  parent  entry   Move  an  entry   Read  and  write  permissions  for  an  entry,  write  permissions   for  both  the  source  parent  entry  and  the  target  parent  entry,   and  traverse  permissions  for  the  target  parent  entry  
  • 10. Connect with us !  Call us: 877.742.4276 !    Email us: training@performanceg2.com, info@performanceg2.com !    Visit our web site: performanceg2.com !    Watch our Cognos videos at: youtube.com/performanceg2 !    Follow us: twitter.com/performanceg2 !    Read our blog !    Upcoming events !  Upcoming training
  • 11. Thank you for attending! training@performanceg2.com