Skip to main content

Securing DB2 and Implementing MLS on z/OS

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on 04 April 2007

  1. .PDF (3.7 MB)

 Order hardcopy
Share this page:   

ISBN-10: 0738486116
ISBN-13: 9780738486116
IBM Form #: SG24-6480-01


Authors: Chris Rayns, Doug Behrends, Rick Butler, Kirsten Ann Larsen, Maggie Lin and Glenn Yuki

menu icon

Abstract

Today's computing environment is subject to increasing regulatory pressures and potentially malicious attacks.

Regulatory compliance, security, and audit are in the daily headlines and growing more prominent.The security of the information to which you have been entrusted has never been more critical. The reality of compliance is too complex.

Compliance demands that you work carefully to set up a strong, comprehensive set of policies and controls. That means controls that consider operational data, financial data, unstructured data, spreadsheets, e-mail, and business intelligence data.

We have a responsibility to secure all business data and especially sensitive customer data. Security can be difficult to manage. IBM DB2 for z/OS already resides on one of the most secure platforms in the industry. IBM System z servers are routinely used by enterprises around the world to support their mission-critical applications. The mainframe's strengths in security stem in part from its history of supporting sensitive data for large enterprises, resulting in security features being built into its design for many decades. It also benefits from a system-wide approach with security capabilities built into the hardware, operating systems, databases, key middleware and more. Its highly evolved layers and security management components give it a fundamental advantage over other systems.

Table of Contents

Chapter 1. What is new in security

Chapter 2. Security labels

Chapter 3. MLS

Chapter 4. Vanguard solution

Chapter 5. MLS as applied to TCP/IP communications

Chapter 6. DB2 access control overview

Chapter 7. DB2 and multilevel security

Chapter 8. Network trusted contexts and roles

Chapter 9. A WebSphere implementation

Chapter 10. RACF access control module

Appendix A. Trusted context syntax

Appendix B. RACF options that control the use of security labels

Appendix C. Enterprise Identity Mapping

 

Others who read this also read