IBM Support

AIX Security: Can I obtain an AIX System and Organization Control 2 (SOC 2) Compliance Report?

Question & Answer


Question

Can I obtain an AIX System and Organization Control 2 (SOC 2) Compliance Report?

Answer

There is no applicable IBM AIX SOC 2 Compliance Report.

The scope of an SOC 2 report is operational. It evaluates the internal controls that an organization has put in place to protect customer-owned data. The report evaluates system and information security, availability, integrity, confidentiality, and privacy.

Service Organization Control (SOC) reports are independent, third-party reports issued by assessors certified by the American Institute of Certified Public Accountants (AICPA) addressing the risks associated with an outsourced service.

An example of IBM SOC 2 compliant services would be some IBM Cloud offerings.

Reference:

AIX is not an "outsourced service", it is an operating system. Security compliance is managed by the system administration, based on requirements for their company. The SOC Trust Services Categories (TSC) cover:

  • Security:
    • Information and systems are protected against unauthorized access (both physical and logical), including usage, and modification
  • Confidentiality:
    • Information designated as confidential is protected to meet the entity’s objectives.
  • Availability:
    • Information and systems are available for operation and use as committed or agreed.
  • Processing Integrity:
    • System processing is complete, valid, accurate, timely, and authorized
  • Privacy:
    • Personal information is collected, used, retained, disclosed, and disposed of to meet the entity’s objectives.

So, the AIX security controls you implement are analyzed in an SOC report, along with other security policies, which include infrastructure, data, procedures, software, and people.

Tips for Securing AIX:

Some customers use PowerSC to maintain AIX compliance with certain standards, like CIS, DoD, GDPR, HIPAA, PCI, SOX-COBIT, SAP.

Some customers use the native AIX Security Expert (AIXpert) which is integrated in to PowerSC.

There are fee-based IBM Security consulting services, which can help you prepare for SOC 2 certification.

And here is more information:

SUPPORT

Security configuration involves comprehensive features. Most of these features require advanced review and planning by administrators who are familiar with all of their system requirements. AIX Support does not make specific recommendations to harden your system. Customization is out of the scope of AIX Support, but if you have specific questions about documented usage, our support experts are happy to assist.

If you have specific questions about usage after reviewing the recommended security documentation, IBM AIX Support will be happy to assist.

If you require consulting services, there are more fee-based services available.

If you require usage assistance, use the following step-by-step instructions to contact IBM to open a case for software with an active and valid support contract.  
 

1.  Document (or collect screen captures of) all symptoms, errors, and messages related to your issue.

2.  Capture any logs or data relevant to the situation.

3.  Contact IBM to open a case:

   -For electronic support, see the IBM Support Community:
     https://www.ibm.com/mysupport
   -If you require telephone support, see the web page:
      https://www.ibm.com/planetwide/

4.  Provide a clear, concise description of the issue.

 

5.  If the system is accessible, collect a system snap, and upload all of the details and data for your case.

  - For more information, see: Working with IBM AIX Support: Collecting snap data

[{"Type":"MASTER","Line of Business":{"code":"LOB08","label":"Cognitive Systems"},"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Product":{"code":"SWG10","label":"AIX"},"ARM Category":[{"code":"a8m0z000000cvzhAAA","label":"Security"}],"ARM Case Number":"","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"All Versions"}]

Document Information

Modified date:
25 September 2023

UID

ibm17035446