Book description
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation scenarios, step-by-step examples, and expert guidance on both the technical and human sides of DB2 security.
This book’s material is organized to support you through every step of securing DB2 in Windows®, Linux®, or UNIX® environments. You’ll start by exploring the regulatory and business issues driving your security efforts, and then master the technological and managerial knowledge crucial to effective implementation. Next, the authors offer practical guidance on post-implementation auditing, and show how to systematically maintain security on an ongoing basis.
Coverage includes
Establishing effective security processes, teams, plans, and policies
Implementing identification and authentication controls, your first lines of defense
DB2 in Windows environments: managing the unique risks, leveraging the unique opportunities
Using the new Label Based Access Control (LBAC) of DB2 9 to gain finer-grained control over data protection
Encrypting DB2 connections, data “in flight,” and data on disk: step-by-step guidance
Auditing and intrusion detection: crucial technical implementation details
Using SSH to secure machine-to-machine communication in DB2 9 multi-partitioned environments
Staying current with the latest DB2 security patches and fixes
Table of contents
- Cover Page
- Title Page
- Copyright Page
- Dedication
- Contents
- Table of Contents
- Preface
- Acknowledgments
- About the Authors
- Introduction
- Chapter 1 The Regulatory Environment
- Chapter 2 DB2 Security-The Starting Point
- Chapter 3 Understanding Identification and Authentication–The First Line of Defense
- Chapter 4 Securing DB2 on Windows
- Chapter 5 Authorization-Authority and Privileges
- Chapter 6 Label Based Access Control
- Chapter 7 Encryption (Cryptography) in DB2
- Chapter 8 Ready, Set, Implement?
- Chapter 9 Database Auditing and Intrusion Detection
- Chapter 10 SSH for Data-Partitioning on UNIX Platforms
- Chapter 11 Database Security-Keeping it Current
- Chapter 12 Final Thoughts: Security-The Human Factor
- Appendix A Independent Security Packages
- Appendix B Kerberos
- Appendix C DB2 Audit Scope Record Layouts
- Appendix D DB2 Audit-Additional Documentation
- Appendix E Security Considerations for DB2
- Appendix F Glossary of Authorization ID
- Appendix G LBAC-Related SYSCAT views
- Appendix H Security Plug-In Return Codes
- Appendix I Detailed Implementation for the Case Study in Chapter 3
- Index
Product information
- Title: Understanding DB2® 9 Security: DB2® Information Management Software
- Author(s):
- Release date: December 2006
- Publisher(s): IBM Press
- ISBN: 0131345907
You might also like
book
Reduce Risk and Improve Security on IBM Mainframes: Volume 3 Mainframe Subsystem and Application Security
This IBM® Redbooks® publication documents the strength and value of the IBM security strategy with IBM …
book
Security Functions of IBM DB2 10 for z/OS
IBM® DB2® 9 and 10 for z/OS® have added functions in the areas of security, regulatory …
book
Mainframe Basics for Security Professionals: Getting Started with RACF
Leverage Your Security Expertise in IBM ® System z™ Mainframe Environments For over 40 years, the …
book
DB2® for z/OS® Version 8 DBA Certification Guide
A practical guide to DB2 z/OS database administration that is 100 percent focused on running DB2 …