This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

OWASP Backend Security Project DB2 Hardening

From OWASP
Revision as of 14:55, 23 May 2008 by Overet (talk | contribs) (References)

Jump to: navigation, search

Overview

Historically DB2 has lived on a mainframe and resided in a fairly secure network. More and more we see DB2 exposed to the large world and used as backend for web applications. With these changes in DB2 comes increased risk.

This paragraph has the objectives to define the minimum security requirements for configuring and managing DB2 databases, in terms of access to, configuration and management of the system, and to supply guidelines and operation instructions for system administrators, in order to guarantee the development of secure applications on DB2 platforms.

Description

Configuring Accounts

Default Account/Group

Configuring Authentication

Authentication parameters

Encryption during Authentication

Configuring Authorisations

Authorisations and privileges on DB groups

Roles, Views and Access controls

Database Management System Configuration

File Permission

Administration

Auditing & Monitoring

Triggers

DB2 Universal Database audit facility

Auditing Events

References

DB2 Security and Compliance Solutions for Linux, UNIX, and Windows - Whei-Jen Chen, Ivo Rytir, Paul Read, Rafat Odeh - IBM Redbooks