DB2 LUW Security: More Ways to Secure your System

Over the years, I have developed many of my security practices and used many of the government security guidelines to perform security audits in client environments. The combination of the government guidelines and my experience helps me uncover and secure the desired client’s systems and applications against ever-changing hacker attack points. One of the resources . . . → Read More: DB2 LUW Security: More Ways to Secure your System

More DB2 Family Security Best Practices Part 8: z/OS Communications Server

This next part (Part 8) builds on the other DB2 Family Security Best Practices blogs which I wrote a while back. (The links for the other seven DB2 Security blogs can be found at the bottom of the page.) This blog talks about adding elements of DB2 security by layering in a z/OS Communication Server . . . → Read More: More DB2 Family Security Best Practices Part 8: z/OS Communications Server

More DB2 Family Security Best Practices Part 7: Preventing SQL Injection

The next part (Part 7) of this DB2 Family Security Best Practices blog talks about preventing SQL injection in all your different applications. SQL injection is the ability of a hacker to provide extra SQL input into any of your interfaces or web sites and access data they want instead of what the application is . . . → Read More: More DB2 Family Security Best Practices Part 7: Preventing SQL Injection

More DB2 Family Security Best Practices Part 5

The next part of this DB2 Family Security Best Practices blog series talks about developing a unique corporate security. This security is unique within your organization and unique within your applications.

Given that encryption can have performance overhead, can complicate management procedures, and require application changes, sometime it’s not an option. So another DB2 security . . . → Read More: More DB2 Family Security Best Practices Part 5

More DB2 Family Security Best Practices Part 4

The next part (Part 4) of this DB2 Family Security Best Practices blog talks about the many aspects and issues around DB2 LUW and DB2 z/OS encryption. Encryption needs to be discussed extensively with your security department and various applications because it has long term impacts on operations, maintenance, and applications.

First, DB2 encryption protects . . . → Read More: More DB2 Family Security Best Practices Part 4

More DB2 Family Security Best Practices Part 3

As I started Part 3 of this DB2 Family Security Best Practices blog, I was notified that my personal information was hacked again. That is five different times my information has been taken. So I offer this third installment on database security that will hopefully help every company secure their data.

I have quickly realized . . . → Read More: More DB2 Family Security Best Practices Part 3

Top 10 DB2 Family Security Best Practices Part 2

Below is Part 2 of the Top 10 DB2 Family Security Best Practices. All the DB2 security-minded DBAs and system administrators should verify their DB2 security configuration along with their DB2 security authority definitions as soon as possible. The first five parts of the Top 10 DB2 Family Security Best Practices that I talked . . . → Read More: Top 10 DB2 Family Security Best Practices Part 2

Top 10 DB2 Family Security Best Practices Part 1

The DB2 database family leads the industry with some of the best security features, safeguards, and mechanisms to secure your data. Security breaches of any database trouble us all, so it is always good to review the best security practices available. Below are a list of the top ten that all DB2 DBAs should verify . . . → Read More: Top 10 DB2 Family Security Best Practices Part 1

DB2 SQL Security Audits

With the all the hacking stories getting a lot of news coverage, security of your DB2 system is paramount. Doing a DB2 SQL security audit periodically or before your DB2 migration has been a standard security best practice of many for countless years and many DB2 Version upgrades. These DB2 SQL security audits help eliminate . . . → Read More: DB2 SQL Security Audits

DB2 Security Definitions

With the all the hacking stories getting a lot of news coverage, security of a company’s information will definitely be on everyone’s mind. There are many DB2 security options and features that can be used within the system, database, and application environments. As I have written before, DB2 security for row and column access . . . → Read More: DB2 Security Definitions