Book description
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation scenarios, step-by-step examples, and expert guidance on both the technical and human sides of DB2 security.
This book’s material is organized to support you through every step of securing DB2 in Windows®, Linux®, or UNIX® environments. You’ll start by exploring the regulatory and business issues driving your security efforts, and then master the technological and managerial knowledge crucial to effective implementation. Next, the authors offer practical guidance on post-implementation auditing, and show how to systematically maintain security on an ongoing basis.
Coverage includes
Establishing effective security processes, teams, plans, and policies
Implementing identification and authentication controls, your first lines of defense
DB2 in Windows environments: managing the unique risks, leveraging the unique opportunities
Using the new Label Based Access Control (LBAC) of DB2 9 to gain finer-grained control over data protection
Encrypting DB2 connections, data “in flight,” and data on disk: step-by-step guidance
Auditing and intrusion detection: crucial technical implementation details
Using SSH to secure machine-to-machine communication in DB2 9 multi-partitioned environments
Staying current with the latest DB2 security patches and fixes
Table of contents
- Cover Page
- Title Page
- Copyright Page
- Dedication
- Contents
- Table of Contents
- Preface
- Acknowledgments
- About the Authors
- Introduction
- Chapter 1 The Regulatory Environment
- Chapter 2 DB2 Security-The Starting Point
- Chapter 3 Understanding Identification and Authentication–The First Line of Defense
- Chapter 4 Securing DB2 on Windows
- Chapter 5 Authorization-Authority and Privileges
- Chapter 6 Label Based Access Control
- Chapter 7 Encryption (Cryptography) in DB2
- Chapter 8 Ready, Set, Implement?
- Chapter 9 Database Auditing and Intrusion Detection
- Chapter 10 SSH for Data-Partitioning on UNIX Platforms
- Chapter 11 Database Security-Keeping it Current
- Chapter 12 Final Thoughts: Security-The Human Factor
- Appendix A Independent Security Packages
- Appendix B Kerberos
- Appendix C DB2 Audit Scope Record Layouts
- Appendix D DB2 Audit-Additional Documentation
- Appendix E Security Considerations for DB2
- Appendix F Glossary of Authorization ID
- Appendix G LBAC-Related SYSCAT views
- Appendix H Security Plug-In Return Codes
- Appendix I Detailed Implementation for the Case Study in Chapter 3
- Index
Product information
- Title: Understanding DB2® 9 Security: DB2® Information Management Software
- Author(s):
- Release date: December 2006
- Publisher(s): IBM Press
- ISBN: 0131345907
You might also like
book
Head First Design Patterns, 2nd Edition
You know you don’t want to reinvent the wheel, so you look to design patterns—the lessons …
book
Designing Data-Intensive Applications
Data is at the center of many challenges in system design today. Difficult issues need to …
book
Fundamentals of Software Architecture
Salary surveys worldwide regularly place software architect in the top 10 best jobs, yet no real …
book
Building Microservices, 2nd Edition
Distributed systems have become more fine-grained as organizations shift from code-heavy monolithic applications to smaller, self-contained …