Skip to main content

Security Functions of IBM DB2 10 for z/OS

An IBM Redbooks publication

thumbnail 

Published on 03 September 2011, updated 15 September 2011

  1. .EPUB (3.7 MB)
  2. .PDF (7.8 MB)

Apple BooksGoogle Play BooksRead in Google Books Order hardcopy
Share this page:   

ISBN-10: 0738436038
ISBN-13: 9780738436036
IBM Form #: SG24-7959-00


Authors: Paolo Bruni, Marcelo Antonelli, Hyun Baek, Rick Butler and Ernie Mancill

    menu icon

    Abstract

    IBM® DB2® 9 and 10 for z/OS® have added functions in the areas of security, regulatory compliance, and audit capability that provide solutions for the most compelling requirements.

    DB2 10 enhances the DB2 9 role-based security with additional administrative and other finer-grained authorities and privileges. This authority granularity helps separate administration and data access that provide only the minimum appropriate authority.

    The authority profiles provide better separation of duties while limiting or eliminating blanket authority over all aspects of a table and its data. In addition, DB2 10 provides a set of criteria for auditing for the possible abuse and overlapping of authorities within a system.

    In DB2 10, improvements to security and regulatory compliance focus on data retention and protecting sensitive data from privileged users and administrators. Improvements also help to separate security administration from database administration.

    DB2 10 also lets administrators enable security on a particular column or particular row in the database complementing the privilege model.

    This IBM Redbooks® publication provides a detailed description of DB2 10 security functions from the implementation and usage point of view. It is intended to be used by database, audit, and security administrators.

    Table of Contents

    Part 1. Security for DB2 for z/OS

    Chapter 1. Security regulations

    Chapter 2. Introduction to security for DB2 for z/OS

    Part 2. DB2 capabilities

    Chapter 3. Administrative authorities and security-related objects

    Chapter 4. Roles and trusted contexts

    Chapter 5. Data access control

    Chapter 6. Cryptography for DB2 data

    Chapter 7. User authentication

    Chapter 8. Audit policies

    Chapter 9. RACF and DB2

    Part 3. Implementation scenarios

    Chapter 10. Implementing data access control

    Chapter 11. Remote client applications access

    Chapter 12. Database monitoring and the audit application

    Chapter 13. DB2 temporal support

    Part 4. Security tools

    Chapter 14. Security tools for discovery and control

    Chapter 15. Auditing and InfoSphere Guardium

    Appendix A. Spiffy Computer Company security setup

    Appendix B. Introduction to cryptography

     

    Others who read this also read