0%

Book Description

Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation scenarios, step-by-step examples, and expert guidance on both the technical and human sides of DB2 security.

This book’s material is organized to support you through every step of securing DB2 in Windows®, Linux®, or UNIX® environments. You’ll start by exploring the regulatory and business issues driving your security efforts, and then master the technological and managerial knowledge crucial to effective implementation. Next, the authors offer practical guidance on post-implementation auditing, and show how to systematically maintain security on an ongoing basis.

Coverage includes

  • Establishing effective security processes, teams, plans, and policies

  • Implementing identification and authentication controls, your first lines of defense

  • DB2 in Windows environments: managing the unique risks, leveraging the unique opportunities

  • Using the new Label Based Access Control (LBAC) of DB2 9 to gain finer-grained control over data protection

  • Encrypting DB2 connections, data “in flight,” and data on disk: step-by-step guidance

  • Auditing and intrusion detection: crucial technical implementation details

  • Using SSH to secure machine-to-machine communication in DB2 9 multi-partitioned environments

  • Staying current with the latest DB2 security patches and fixes

  • Table of Contents

    1. Cover Page
    2. Title Page
    3. Copyright Page
    4. Dedication
    5. Contents
    6. Table of Contents
    7. Preface
    8. Acknowledgments
    9. About the Authors
    10. Introduction
    11. Chapter 1 The Regulatory Environment
    12. Chapter 2 DB2 Security-The Starting Point
    13. Chapter 3 Understanding Identification and Authentication–The First Line of Defense
    14. Chapter 4 Securing DB2 on Windows
    15. Chapter 5 Authorization-Authority and Privileges
    16. Chapter 6 Label Based Access Control
    17. Chapter 7 Encryption (Cryptography) in DB2
    18. Chapter 8 Ready, Set, Implement?
    19. Chapter 9 Database Auditing and Intrusion Detection
    20. Chapter 10 SSH for Data-Partitioning on UNIX Platforms
    21. Chapter 11 Database Security-Keeping it Current
    22. Chapter 12 Final Thoughts: Security-The Human Factor
    23. Appendix A Independent Security Packages
    24. Appendix B Kerberos
    25. Appendix C DB2 Audit Scope Record Layouts
    26. Appendix D DB2 Audit-Additional Documentation
    27. Appendix E Security Considerations for DB2
    28. Appendix F Glossary of Authorization ID
    29. Appendix G LBAC-Related SYSCAT views
    30. Appendix H Security Plug-In Return Codes
    31. Appendix I Detailed Implementation for the Case Study in Chapter 3
    32. Index