Db2 for zOS V12 introduces a new UNLOAD authority permission for tables. This is “beside” the good-old-fashioned classic table authority permissions for SELECTAUTH, INSERTAUTH, DELETEAUTH, UPDATEAUTH, etc. etc. This UNLOAD authority controls the ability to use the UNLOAD utility on the...
As many other I got challenged to set up a database architecture. Not only database objects related, describing the different environments was also asked and there was an urgent need for a decent security setup to support rollouts in general. First thing on my agenda was to move the...
Sadly, data breaches have become an all too common occurrence, and have the potential to cost you millions of dollars. This presentation will cover the “Five Ws” of keeping your DB2 data safe with encryption: Why encrypt your database? Where should you encrypt your data? Who is responsible for...
Recently, we had a discussion with my colleagues about managing the column access in DB2 for z/OS via the column masks. One of my smart mates had a very good question - how do column masks work with joins? His idea was pretty simple: if column masks are evaluated during the output only, why not...
When using LDAP in DB2 to check who had access to a database and which items are available to a user works fine even though when looking to db2diag.log you should wonder. The number of messages passing by in that file makes you aware how many checks are done while going thru the data in your...
The Importance of Encryption John Maenpaa A few days ago, I received an urgent question about how to protect sensitive data stored in a table on their database server. Her boss wanted to make it easy for team members to get the information so they could do testing. In this case, the data...
November 2014 eBulletin
IDUG_eBulletin_November2014.pdf
This month, we’re going to talk about security. Maintaining good security in our applications is extremely important. If you’ve read any of the recent reports of credit card theft, identify theft, or just plain data theft, then you have a glimmer of why it is so important. But keeping things...
Walid Rjaibi being interviewed by Rav Ahuja about security enhancements in DB2 Viper 2. Part I covers Database Roles and Trusted Context. ... DB2 Viper security enhancements database roles trusted context auditing LBAC future
Walid Rjaibi being interviewed by Rav Ahuja about security related improvements in DB2 Viper 2. Part II covers auditing, LBAC, resources, and futures. ... DB2 Viper 2 security enhancements database roles trusted context auditing LBAC future Walid Rjaibi Rav Ahuja