| 1.1 Install the latest fix packs | SYSTEM AND INFORMATION INTEGRITY  | 
| 3.1.2 Encrypt user data across the network | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| 3.1.6 Secure permissions for default database file path | AUDIT AND ACCOUNTABILITY  | 
| 3.1.8 Secure all diagnostic logs | AUDIT AND ACCOUNTABILITY  | 
| 3.1.17 Reserve the desired port number or name for incoming connection requests | CONFIGURATION MANAGEMENT  | 
| 3.1.18 Reserve the desired port number or name for incoming SSL connections | CONFIGURATION MANAGEMENT  | 
| 3.3.2 Set a generic system name | CONFIGURATION MANAGEMENT  | 
| 3.3.3 Disable DAS discoverability | CONFIGURATION MANAGEMENT  | 
| 3.3.4 Prevent execution of expired tasks | CONFIGURATION MANAGEMENT  | 
| 3.3.5 Secure the JDK 32-bit runtime library | CONFIGURATION MANAGEMENT  | 
| 3.3.6 Secure the JDK 64-bit runtime library | CONFIGURATION MANAGEMENT  | 
| 3.3.7 Disable unused task scheduler | CONFIGURATION MANAGEMENT  | 
| 7.1 Establish an administrator group | ACCESS CONTROL  | 
| 7.2 Establish a system control group | ACCESS CONTROL  | 
| 8.2 Restrict access to starting and stopping the DB2 administration server | ACCESS CONTROL  | 
| 8.5 Remove default databases | CONFIGURATION MANAGEMENT  | 
| CIS_IBM_DB2_9_v3.0.1_Level_2_OS_Linux.audit from CIS DB2 9 Linux |  |