OWASP Backend Security Project DB2 Hardening

From OWASP
Revision as of 14:50, 23 May 2008 by Overet (talk | contribs)

Jump to: navigation, search

Overview

Historically DB2 has lived on a mainframe and resided in a fairly secure network. More and more we see DB2 exposed to the large world and used as backend for web applications. With these changes in DB2 comes increased risk.

This paragraph has the objectives to define the minimum security requirements for configuring and managing DB2 databases, in terms of access to, configuration and management of the system, and to supply guidelines and operation instructions for system administrators, in order to guarantee the development of secure applications on DB2 platforms.

Description

Configuring Accounts

Default Account/Group

Configuring Authentication

Authentication parameters

Encryption during Authentication

Configuring Authorisations

Authorisations and privileges on DB groups

Roles, Views and Access controls

Database Management System Configuration

File Permission

Administration

Auditing & Monitoring

Triggers

DB2 Universal Database audit facility

Auditing Events

References