Best practices: Step by step instructions to configure a secure database system

Session Number: 7415
Track: Virtual Event - Live
Session Type: Podium Presentation
Primary Presenter: Greg Stager [IBM]
Time: Jul 23, 2020 (02:15 PM - 03:15 PM)

Speaker Bio: Greg Stager is the security architect for Db2 LUW at the IBM Toronto Lab. Greg has been a member of the Db2 security development team since 2000, where he has worked on all aspects of security within Db2, including authentication, authorization, auditing and encryption. Most recently he has led the development of the native encryption feature and associated key management functionality within Db2.
Audience experience level: Beginner, Intermediate
Presentation Category: Data Management
Presentation Platform: DB2 for Linux, UNIX, Windows
Audiences this presentation will apply to: Database Administrators, IT Managers
Technical areas this presentation will apply to: Security (DB2 for LUW)
Objective 1: Learn the best practices required for OS configuration to ensure a secure Db2 setup.
Objective 2: Learn the best practices for securely authenticating users to Db2.
Objective 3: Learn the best practices for controlling what data users have access to through various authorization features of Db2.
Objective 4: Learn the best practices for encrypting both data at rest and data in motion.
Objective 5: Learn the best practices for tracking database activity using audit.

Abstract:  From installation to rolling into production, security impacts every step of setting up a database system. From the OS, to authentication, authorization, encryption and auditing, a locked down database is a necessity in today's world. Best practices for each of these areas will be discussed, and a practical example setup will be presented. You will learn how to take a bare Linux system and turn it into a hardened database server.