CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows

Audit Details

Name: CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows

Updated: 4/12/2023

Authority: CIS

Plugin: Windows

Revision: 1.14

Estimated Item Count: 29

File Details

Filename: CIS_IBM_DB2_9_Benchmark_v3.0.1_Level_1_OS_Windows.audit

Size: 73.3 kB

MD5: 090c3948776a0fc4973acbae7686f63d
SHA256: 1721f814b0ab7c2e95064df1107e9dc2c7bfe5926718afc1b73ad28636d5a628

Audit Items

DescriptionCategories
1.1 Install the latest fix packs

SYSTEM AND INFORMATION INTEGRITY

1.2 Use IP address rather than hostname

CONFIGURATION MANAGEMENT

1.4 Use non-default account names

ACCESS CONTROL

2.1 Secure the DB2 Runtime Library
2.2 Secure the database container directory
3.1.2 Encrypt user data across the network

SYSTEM AND COMMUNICATIONS PROTECTION

3.1.6 Secure permissions for default database file path

AUDIT AND ACCOUNTABILITY

3.1.8 Secure all diagnostic logs
3.2.4 Secure permissions for the primary archive log location

AUDIT AND ACCOUNTABILITY

3.2.4 Secure permissions for the primary archive log location - FILE_PERMISSIONS

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.2.5 Secure permissions for the secondary archive log location

AUDIT AND ACCOUNTABILITY

3.2.5 Secure permissions for the secondary archive log location - FILE_PERMISSIONS

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.2.6 Secure permissions for the tertiary archive log location

AUDIT AND ACCOUNTABILITY

3.2.6 Secure permissions for the tertiary archive log location - FILE_PERMISSIONS
3.2.7 Secure permissions for the log mirror location

AUDIT AND ACCOUNTABILITY

3.2.7 Secure permissions for the log mirror location - FILE_PERMISSIONS

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.3.1 Establish DAS administrative group

ACCESS CONTROL

7.3 Establish a system maintenance group

ACCESS CONTROL

7.4 Establish a system monitoring group

ACCESS CONTROL

8.1 Restrict access to starting and stopping DB2 instances

ACCESS CONTROL

8.5 Remove default databases

CONFIGURATION MANAGEMENT

8.6 Enable SSL communication with LDAP server

SYSTEM AND COMMUNICATIONS PROTECTION

8.7 Secure the permissions of the IBMLDAPSecurity.ini file
8.8 Secure the permissions of the SSLconfig.ini file
10.1 Restrict access to the DB2 Control Center

ACCESS CONTROL

10.2 Restrict access to the DB2 Configuration Assistant utility

ACCESS CONTROL

10.3 Restrict access to the DB2 Health Monitor utility

ACCESS CONTROL

10.4 Restrict access to the DB2 Activity Monitor utility

ACCESS CONTROL

CIS_IBM_DB2_9_Benchmark_v3.0.1_Level_2_OS_Windows.audit from CIS IBM DB2 9 Benchmark v3.0.1