Search

1 to 10 of 101
Sort by

Blog Entry
New V12 functionality - UNLOAD authority! Why? What is the point?

Db2 for zOS V12 introduces a new UNLOAD authority permission for tables. This is “beside” the good-old-fashioned classic table authority permissions for SELECTAUTH, INSERTAUTH, DELETEAUTH, UPDATEAUTH, etc. etc. This UNLOAD authority controls the ability to use the UNLOAD utility on the...

Brian Laube's profile image

Blog Entry
DBADM can maintain all database objects … but not really?

As many other I got challenged to set up a database architecture. Not only database objects related, describing the different environments was also asked and there was an urgent need for a decent security setup to support rollouts in general. First thing on my agenda was to move the...

Eddy Coppens's profile image

Blog Entry
The 5 Ws of Database Encryption

Sadly, data breaches have become an all too common occurrence, and have the potential to cost you millions of dollars. This presentation will cover the “Five Ws” of keeping your DB2 data safe with encryption: Why encrypt your database? Where should you encrypt your data? Who is responsible for...

Ian Bjorhovde's profile image

Blog Entry
Unmasking The Masked Data by Emil Kotrc

Recently, we had a discussion with my colleagues about managing the column access in DB2 for z/OS via the column masks. One of my smart mates had a very good question - how do column masks work with joins? His idea was pretty simple: if column masks are evaluated during the output only, why not...

Emil Kotrc's profile image

Blog Entry
Moving from maximal LDAP and privileges to a minimal LDAP and a maximal use of roles - Eddy Coppens

When using LDAP in DB2 to check who had access to a database and which items are available to a user works fine even though when looking to db2diag.log you should wonder. The number of messages passing by in that file makes you aware how many checks are done while going thru the data in your...

David Simpson's profile image

Blog Entry
The Importance of Encryption by John Maenpaa

The Importance of Encryption John Maenpaa A few days ago, I received an urgent question about how to protect sensitive data stored in a table on their database server. Her boss wanted to make it easy for team members to get the information so they could do testing. In this case, the data...

David Simpson's profile image


Blog Entry
Don't Trust Me

This month, we’re going to talk about security. Maintaining good security in our applications is extremely important. If you’ve read any of the recent reports of credit card theft, identify theft, or just plain data theft, then you have a glimmer of why it is so important. But keeping things...

John Maenpaa's profile image

Library Entry
Security Enhancements in DB2 Viper 2 - Part I

Walid Rjaibi being interviewed by Rav Ahuja about security enhancements in DB2 Viper 2. Part I covers Database Roles and Trusted Context. ... DB2 Viper security enhancements database roles trusted context auditing LBAC future


Library Entry
Security Enhancements in DB2 Viper 2 - Part II

Walid Rjaibi being interviewed by Rav Ahuja about security related improvements in DB2 Viper 2. Part II covers auditing, LBAC, resources, and futures. ... DB2 Viper 2 security enhancements database roles trusted context auditing LBAC future Walid Rjaibi Rav Ahuja