From IBM DB2 V10.5 LUW Security Technical Implementation Guide
Part of SRG-APP-000121-DB-000202
Associated with: CCI-001493
Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data.
Run the following command to find the value of the SYSADM_GROUP parameter:
$db2 get dbm cfg
Only authorized OS users should be part of this group. If non-authorized users are part of SYSADM_GROUP group, this is a finding.
On Windows systems, if the SYSADM_GROUP database manager configuration parameter is not specified, this is a finding.
Security administrator (who holds SECADM authority within a database) can define audit policies and control the audit requirements for an individual database. The security administrator can use the following audit routines to operate upon the database audit logs:
- The SYSPROC.AUDIT_ARCHIVE stored procedure archives audit logs.
- The SYSPROC.AUDIT_LIST_LOGS table function allows you to locate logs of interest.
- The SYSPROC.AUDIT_DELIM_EXTRACT stored procedure extracts data into delimited files for analysis.
The security administrator can also grant EXECUTE privilege on these routines to another user.
Run the following query to find out which users have SECADM authority in database:
DB2> SELECT CHAR(GRANTOR,35) AS GRANTOR, CHAR(GRANTEE,35) AS GRANTEE, GRANTEETYPE
FROM SYSCAT.DBAUTH
WHERE SECURITYADMAUTH='Y'
If GRANTEETYPE is 'U' and the authorization ID is not an authorized user, this is a finding.
If the GRANTEETYPE is 'G', then all members of the external group identified by GRANTEE must be authorized users. Otherwise, this is a finding.
If the GRANTEETYPE is 'R', then all members of the database role identified by GRANTEE must be authorized users. Otherwise, this is a finding.
The members of a role can be found using this statement:
DB2> SELECT CHAR(GRANTOR,35) AS GRANTOR, CHAR(GRANTEE,35) AS GRANTEE, GRANTEETYPE
FROM SYSCAT.ROLEAUTH
WHERE ROLENAME=
Update the value SYSADM_GROUP to a group which has only members approved by ISSM using following command:
$db2 update dbm cfg using SYSADM_GROUP
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer