O'Reilly logo

Understanding DB2® 9 Security: DB2® Information Management Software by Yuk-Kuen Henry Chan, Carmen Ka Man Wong, Kevin Yeung-Kuen See, Rebecca Bond

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix E. Security Considerations for DB2

The National Institute of Standards and Technology (NIST) published a series of security-readiness review checklists for major database vendors such as IBM DB2. The DB2 Database Security Readiness Review Checklist is located at http://checklists.nist.gov/repository/category.html.

From time to time, DB2 will also publish an advisory security-readiness checklist at the IBM developerWorks website: www-128.ibm.com/developerworks/db2/zones/db2udb/.

In addition, there are many security consideration sections in the DB2 documentation that are centralized here for easier access.

Security Considerations (Sourced from Administration Guide: Implementation)

Gaining Access to Data Through Indirect Means

The following ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required