We recommend periodic review of your overall security policy implemenation to ensure it is still compliant with your goals.
The IBM i has quite a few security reports that you can run from the Security Tools menu (SECTOOLS).
Option #20 will get you to the Security Reports menu (SECBATCH).
Different options on the menu will produce different reports, many of them very useful when scanning for security implementation entropy. Each of these options prompts for a Submit Job command so that the reports run in batch. Pressing the F4 key from the Submit Job command line will let you review and change parameters.
Here is a sample of the "Print Adopting Objects" report listing all programs on the system that adopt the authority of the security officer, QSECOFR:
Our product, iSecMap monitors security policy for you to protect from unexpected and unwanted changes.
BROWSE KISCO U