Monday, August 15, 2011

Redbook Security Functions with DB2 10 for z/OS

Hi User,

IBM just published a draft version of a new Redbook "Security Functions with DB2 10 for z/OS, SG24-7959-00":
http://www.redbooks.ibm.com/Redbooks.nsf/RedpieceAbstracts/sg247959.html?Open

Abstract
DB2 9 and 10 for z/OS have added functions in the areas of security, regulatory compliance, and audit capability which provide solutions for the most compelling requirements.
DB2 10 enhances the DB2 9 role-based security with additional administrative and other finer-grained authorities and privileges. This authority granularity helps separate administration and data access that provide only the minimum appropriate authority.
The authority profiles provide better separation of duties while limiting or eliminating blanket authority over all aspects of a table and its data. In addition, DB2 10 provides a set of criteria for auditing for the possible abuse and overlapping of authorities within a system.
In DB2 10, improvements to security and regulatory compliance focus on data retention and protecting sensitive data from privileged users and administrators. Improvements also help to separate security administration from database administration.
DB2 10 also lets administrators enable security on a particular column or particular row in the database complementing the privilege model.
This IBM® Redbooks® publication provides a detailed description of DB2 10 security functions from the implementation and usage point of view.
.

Table of Contents
Chapter 1. Regulations
Chapter 2. Introduction to security for DB2 for z/OS
Chapter 3. RACF and DB2
Chapter 4. Administrative authorities and security-related objects
Chapter 5. Roles and trusted context
Chapter 6. Data access control
Chapter 7. Cryptography
Chapter 8. End user authentication
Chapter 9. Audit policies
Chapter 10. Implementing data access control
Chapter 11. Remote client applications access
Chapter 12. Database monitoring and the audit application
Chapter 13. Auditing and IBM InfoSphere Guardium
Chapter 14. DB2 temporal support
Appendix A. Spiffy Computer company security setup



Regards,

DB2usa.


Labels: ,