CIS IBM DB2 11 v1.0.0 Database Level 2

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS IBM DB2 11 v1.0.0 Database Level 2

Updated: 6/17/2024

Authority: CIS

Plugin: IBM_DB2DB

Revision: 1.2

Estimated Item Count: 156

File Details

Filename: CIS_IBM_DB2_11_v1.0.0_Level_2_Database.audit

Size: 180 kB

MD5: 481560f030e8b36486450280b6038c76
SHA256: e4c54b87e525c5a3225be8a191205b24892ff7385d5da9ddc120fb4793684d0c

Audit Items

DescriptionCategories
1.1.1 Install Available Updates
2.1 Prevent Database Users from Logging into the Operating System
3.3.2 Secure the Database Container Directory
4.1.1 Creating the Database without PUBLIC Grants (RESTRICTIVE)
4.2.1 Restrict Access to SYSCAT.AUDITPOLICIES
4.2.2 Restrict Access to SYSCAT.AUDITUSE
4.2.3 Restrict Access to SYSCAT.COLAUTH
4.2.4 Restrict Access to SYSCAT.COLDIST
4.2.5 Restrict Access to SYSCAT.COLGROUPDIST
4.2.6 Restrict Access to SYSCAT.COLUMNS
4.2.7 Restrict Access to SYSCAT.CONTEXTATTRIBUTES
4.2.8 Restrict Access to SYSCAT.CONTEXTS
4.2.9 Restrict Access to SYSCAT.CONTROLDEP
4.2.10 Restrict Access to SYSCAT.CONTROLS
4.2.11 Restrict Access to SYSCAT.DBAUTH
4.2.12 Restrict Access to SYSCAT.EVENTS
4.2.13 Restrict Access to SYSCAT.EVENTTABLES
4.2.14 Restrict Access to SYSCAT.EXTERNALTABLEOPTIONS
4.2.15 Restrict Access to SYSCAT.INDEXAUTH
4.2.16 Restrict Access to SYSCAT.MODULEAUTH
4.2.17 Restrict Access to SYSCAT.PACKAGEAUTH
4.2.18 Restrict Access to SYSCAT.PACKAGES
4.2.19 Restrict Access to SYSCAT.PASSTHRUAUTH
4.2.20 Restrict Access to SYSCAT.ROLEAUTH
4.2.21 Restrict Access to SYSCAT.ROLES
4.2.22 Restrict Access to SYSCAT.ROUTINEAUTH
4.2.23 Restrict Access to SYSCAT.ROUTINES
4.2.24 Restrict Access to SYSCAT.SECURITYLABELACCESS
4.2.25 Restrict Access to SYSCAT.SECURITYLABELCOMPONENTELEMENTS
4.2.26 Restrict Access to SYSCAT.SECURITYLABELCOMPONENTS
4.2.27 Restrict Access to SYSCAT.SECURITYLABELS
4.2.28 Restrict Access to SYSCAT.SECURITYPOLICIES
4.2.29 Restrict Access to SYSCAT.SECURITYPOLICYCOMPONENTRULES
4.2.30 Restrict Access to SYSCAT.SECURITYPOLICYEXEMPTIONS
4.2.31 Restrict Access to SYSCAT.SERVEROPTIONS
4.2.32 Restrict Access to SYSCAT.SCHEMAAUTH
4.2.33 Restrict Access to SYSCAT.SCHEMATA
4.2.34 Restrict Access to SYSCAT.SEQUENCEAUTH
4.2.35 Restrict Access to SYSCAT.STATEMENTS
4.2.36 Restrict Access to SYSCAT.STATEMENTTEXTS
4.2.37 Restrict Access to SYSCAT.SURROGATEAUTHIDS
4.2.38 Restrict Access to SYSCAT.TABAUTH
4.2.39 Restrict Access to SYSCAT.TBSPACEAUTH
4.2.40 Restrict Access to SYSCAT.USEROPTIONS
4.2.41 Restrict Access to SYSCAT.VARIABLEAUTH
4.2.42 Restrict Access to SYSCAT.VARIABLES
4.2.43 Restrict Access to SYSCAT.WORKLOADAUTH
4.2.44 Restrict Access to SYSCAT.WRAPOPTIONS
4.2.45 Restrict Access to SYSCAT.XSROBJECTAUTH
4.2.46 Restrict Access to SYSSTAT.COLDIST