CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows

Audit Details

Name: CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows

Updated: 6/17/2024

Authority: CIS

Plugin: Windows

Revision: 1.15

Estimated Item Count: 29

File Details

Filename: CIS_IBM_DB2_9_Benchmark_v3.0.1_Level_1_OS_Windows.audit

Size: 73.3 kB

MD5: 4c8ba4df4afa9a8ed4478538f4909813
SHA256: fa8a978efd1d0e191d9457ba20e8bd4cead944014ad5ed85b8ce83baa6e20b3f

Audit Items

DescriptionCategories
1.1 Install the latest fix packs

SYSTEM AND INFORMATION INTEGRITY

1.2 Use IP address rather than hostname

CONFIGURATION MANAGEMENT

1.4 Use non-default account names

ACCESS CONTROL

2.1 Secure the DB2 Runtime Library
2.2 Secure the database container directory
3.1.2 Encrypt user data across the network

SYSTEM AND COMMUNICATIONS PROTECTION

3.1.6 Secure permissions for default database file path

AUDIT AND ACCOUNTABILITY

3.1.8 Secure all diagnostic logs
3.2.4 Secure permissions for the primary archive log location

AUDIT AND ACCOUNTABILITY

3.2.4 Secure permissions for the primary archive log location - FILE_PERMISSIONS

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.2.5 Secure permissions for the secondary archive log location

AUDIT AND ACCOUNTABILITY

3.2.5 Secure permissions for the secondary archive log location - FILE_PERMISSIONS

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.2.6 Secure permissions for the tertiary archive log location

AUDIT AND ACCOUNTABILITY

3.2.6 Secure permissions for the tertiary archive log location - FILE_PERMISSIONS
3.2.7 Secure permissions for the log mirror location

AUDIT AND ACCOUNTABILITY

3.2.7 Secure permissions for the log mirror location - FILE_PERMISSIONS

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.3.1 Establish DAS administrative group

ACCESS CONTROL

7.3 Establish a system maintenance group

ACCESS CONTROL

7.4 Establish a system monitoring group

ACCESS CONTROL

8.1 Restrict access to starting and stopping DB2 instances

ACCESS CONTROL

8.5 Remove default databases

CONFIGURATION MANAGEMENT

8.6 Enable SSL communication with LDAP server

SYSTEM AND COMMUNICATIONS PROTECTION

8.7 Secure the permissions of the IBMLDAPSecurity.ini file
8.8 Secure the permissions of the SSLconfig.ini file
10.1 Restrict access to the DB2 Control Center

ACCESS CONTROL

10.2 Restrict access to the DB2 Configuration Assistant utility

ACCESS CONTROL

10.3 Restrict access to the DB2 Health Monitor utility

ACCESS CONTROL

10.4 Restrict access to the DB2 Activity Monitor utility

ACCESS CONTROL

CIS_IBM_DB2_9_Benchmark_v3.0.1_Level_2_OS_Windows.audit from CIS IBM DB2 9 Benchmark v3.0.1