1.1 Install the latest fix packs | SYSTEM AND INFORMATION INTEGRITY |
3.1.2 Encrypt user data across the network | SYSTEM AND COMMUNICATIONS PROTECTION |
3.1.6 Secure permissions for default database file path | AUDIT AND ACCOUNTABILITY |
3.1.8 Secure all diagnostic logs | AUDIT AND ACCOUNTABILITY |
3.1.17 Reserve the desired port number or name for incoming connection requests | CONFIGURATION MANAGEMENT |
3.1.18 Reserve the desired port number or name for incoming SSL connections | CONFIGURATION MANAGEMENT |
3.3.2 Set a generic system name | CONFIGURATION MANAGEMENT |
3.3.3 Disable DAS discoverability | CONFIGURATION MANAGEMENT |
3.3.4 Prevent execution of expired tasks | CONFIGURATION MANAGEMENT |
3.3.5 Secure the JDK 32-bit runtime library | CONFIGURATION MANAGEMENT |
3.3.6 Secure the JDK 64-bit runtime library | CONFIGURATION MANAGEMENT |
3.3.7 Disable unused task scheduler | CONFIGURATION MANAGEMENT |
7.1 Establish an administrator group | ACCESS CONTROL |
7.2 Establish a system control group | ACCESS CONTROL |
8.2 Restrict access to starting and stopping the DB2 administration server | ACCESS CONTROL |
8.5 Remove default databases | CONFIGURATION MANAGEMENT |
CIS_IBM_DB2_9_v3.0.1_Level_2_OS_Linux.audit from CIS DB2 9 Linux | |