| 1.1 Install the latest fix packs | |
| 1.3 Leverage the least privilege principle | |
| 1.6 Creating the database with the RESTERICTIVE clause | |
| 3.2.1 TCP/IP service name - svcename | |
| 3.2.2 SSL service name - ssl_svcename | |
| 3.2.3 Authentication type for incoming connections at the server - srvcon_auth | |
| 3.2.4 Database Manager Configuration parameter: trust_allclnts | |
| 3.2.5 Database Manager Configuration parameter: trust_clntauth | |
| 4.1 Review Organization's Policies against DB2 RCAC Policies | |
| 4.2 Secure SECADM Authority | |
| 4.4 Review Row Permission logic according to policy | |
| 4.5 Review Column Mask logic according to policy | |
| 5.1 Enable Backup Redundancy | |
| 5.2 Protecting Backups | |
| 6.1 Restrict Access to SYSCAT.AUDITPOLICIES | ACCESS CONTROL |
| 6.2 Restrict Access to SYSCAT.AUDITUSE | ACCESS CONTROL |
| 6.3 Restrict Access to SYSCAT.DBAUTH | ACCESS CONTROL |
| 6.4 Restrict Access to SYSCAT.COLAUTH | ACCESS CONTROL |
| 6.5 Restrict Access to SYSCAT.EVENTS | ACCESS CONTROL |
| 6.6 Restrict Access to SYSCAT.EVENTTABLES | ACCESS CONTROL |
| 6.7 Restrict Access to SYSCAT.ROUTINES | ACCESS CONTROL |
| 6.8 Restrict Access to SYSCAT.INDEXAUTH | ACCESS CONTROL |
| 6.9 Restrict Access to SYSCAT.PACKAGEAUTH | ACCESS CONTROL |
| 6.10 Restrict Access to SYSCAT.PACKAGES | ACCESS CONTROL |
| 6.11 Restrict Access to SYSCAT.PASSTHRUAUTH | ACCESS CONTROL |
| 6.12 Restrict Access to SYSCAT.SECURITYPOLICIES | ACCESS CONTROL |
| 6.13 Restrict Access to SYSCAT.SECURITYPOLICYEXEMPTIONS | ACCESS CONTROL |
| 6.14 Restrict Access to SYSCAT.SURROGATEAUTHIDS | ACCESS CONTROL |
| 6.15 Restrict Access to SYSCAT.ROLEAUTH | ACCESS CONTROL |
| 6.16 Restrict Access to SYSCAT.ROLES | ACCESS CONTROL |
| 6.17 Restrict Access to SYSCAT.ROUTINEAUTH | ACCESS CONTROL |
| 6.18 Restrict Access to SYSCAT.SCHEMAAUTH | ACCESS CONTROL |
| 6.19 Restrict Access to SYSCAT.SCHEMATA | ACCESS CONTROL |
| 6.20 Restrict Access to SYSCAT.SEQUENCEAUTH | ACCESS CONTROL |
| 6.21 Restrict Access to SYSCAT.STATEMENTS | ACCESS CONTROL |
| 6.22 Restrict Access to SYSCAT.TABAUTH | ACCESS CONTROL |
| 6.23 Restrict Access to SYSCAT.TBSPACEAUTH | ACCESS CONTROL |
| 6.24 Restrict Access to Tablespaces | ACCESS CONTROL |
| 6.25 Restrict Access to SYSCAT.MODULEAUTH | ACCESS CONTROL |
| 6.26 Restrict Access to SYSCAT.VARIABLEAUTH | ACCESS CONTROL |
| 6.27 Restrict Access to SYSCAT.WORKLOADAUTH | ACCESS CONTROL |
| 6.28 Restrict Access to SYSCAT.XSROBJECTAUTH | ACCESS CONTROL |
| 6.29 Restrict Access to SYSCAT.AUTHORIZATIONIDS | ACCESS CONTROL |
| 6.30 Restrict Access to SYSIBMADM.OBJECTOWNERS | ACCESS CONTROL |
| 6.31 Restrict Access to SYSIBMADM.PRIVILEGES | ACCESS CONTROL |
| 7.5 Secure SECADM Authority | |
| 7.6 Secure DBADM Authority | |
| 7.7 Secure SQLADM Authority | |
| 7.8 Secure DATAACCESS Authority | |
| 7.9 Secure ACCESSCTRL Authority | |