| 1.1 Install the latest fix packs | SYSTEM AND INFORMATION INTEGRITY |
| 1.2 Use IP address rather than hostname | CONFIGURATION MANAGEMENT |
| 1.4 Use non-default account names | ACCESS CONTROL |
| 2.1 Secure the DB2 Runtime Library | |
| 2.2 Secure the database container directory | |
| 3.1.2 Encrypt user data across the network | SYSTEM AND COMMUNICATIONS PROTECTION |
| 3.1.6 Secure permissions for default database file path | AUDIT AND ACCOUNTABILITY |
| 3.1.8 Secure all diagnostic logs | |
| 3.2.4 Secure permissions for the primary archive log location | AUDIT AND ACCOUNTABILITY |
| 3.2.4 Secure permissions for the primary archive log location - FILE_PERMISSIONS | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
| 3.2.5 Secure permissions for the secondary archive log location | AUDIT AND ACCOUNTABILITY |
| 3.2.5 Secure permissions for the secondary archive log location - FILE_PERMISSIONS | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
| 3.2.6 Secure permissions for the tertiary archive log location | AUDIT AND ACCOUNTABILITY |
| 3.2.6 Secure permissions for the tertiary archive log location - FILE_PERMISSIONS | |
| 3.2.7 Secure permissions for the log mirror location | AUDIT AND ACCOUNTABILITY |
| 3.2.7 Secure permissions for the log mirror location - FILE_PERMISSIONS | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
| 3.3.1 Establish DAS administrative group | ACCESS CONTROL |
| 7.3 Establish a system maintenance group | ACCESS CONTROL |
| 7.4 Establish a system monitoring group | ACCESS CONTROL |
| 8.1 Restrict access to starting and stopping DB2 instances | ACCESS CONTROL |
| 8.5 Remove default databases | CONFIGURATION MANAGEMENT |
| 8.6 Enable SSL communication with LDAP server | SYSTEM AND COMMUNICATIONS PROTECTION |
| 8.7 Secure the permissions of the IBMLDAPSecurity.ini file | |
| 8.8 Secure the permissions of the SSLconfig.ini file | |
| 10.1 Restrict access to the DB2 Control Center | ACCESS CONTROL |
| 10.2 Restrict access to the DB2 Configuration Assistant utility | ACCESS CONTROL |
| 10.3 Restrict access to the DB2 Health Monitor utility | ACCESS CONTROL |
| 10.4 Restrict access to the DB2 Activity Monitor utility | ACCESS CONTROL |
| CIS_IBM_DB2_9_Benchmark_v3.0.1_Level_2_OS_Windows.audit from CIS IBM DB2 9 Benchmark v3.0.1 | |