This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
OWASP Backend Security Project DB2 Hardening
From OWASP
Overview
Historically DB2 has lived on a mainframe and resided in a fairly secure network. More and more we see DB2 exposed to the large world and used as backend for web applications. With these changes in DB2 comes increased risk.
This paragraph has the objectives to define the minimum security requirements for configuring and managing DB2 databases, in terms of access to, configuration and management of the system, and to supply guidelines and operation instructions for system administrators, in order to guarantee the development of secure applications on DB2 platforms.
Description
Configuring Accounts
Default Account/Group
Configuring Authentication
Authentication parameters
Encryption during Authentication
Configuring Authorisations
Authorisations and privileges on DB groups
Roles, Views and Access controls
Database Management System Configuration
File Permission
Administration
Auditing & Monitoring
Triggers
DB2 Universal Database audit facility
Auditing Events
References
- DB2 Security and Compliance Solutions for Linux, UNIX, and Windows - Whei-Jen Chen, Ivo Rytir, Paul Read, Rafat Odeh - IBM Redbooks