1.2 Use IP address rather than hostname | CONFIGURATION MANAGEMENT |
1.4 Use non-default account names | ACCESS CONTROL |
1.5 Configure DB2 to use non-standard ports - Port 523 | CONFIGURATION MANAGEMENT |
1.5 Configure DB2 to use non-standard ports - Port 50000 | CONFIGURATION MANAGEMENT |
2.1 Secure DB2 Runtime Library | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
2.2 Secure the database container directory | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
2.4 Verify the groups within the DB2_GRP_LOOKUP environment variable are appropriate (Windows only) | ACCESS CONTROL |
2.5 Verify the domains within the DB2DOMAINLIST environment variable are appropriate (Windows only) | ACCESS CONTROL |
3.1.1 Enable audit buffer | AUDIT AND ACCOUNTABILITY |
3.1.2 Encrypt user data across the network | SYSTEM AND COMMUNICATIONS PROTECTION |
3.1.3 Require explicit authorization for cataloging | ACCESS CONTROL |
3.1.4 Disable datalinks support | |
3.1.6 Secure permissions for default database file path | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.1.7 Set diagnostic logging to capture errors and warnings | AUDIT AND ACCOUNTABILITY |
3.1.8 Secure permissions for all diagnostic logs | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.1.9 Require instance name for discovery requests | CONFIGURATION MANAGEMENT |
3.1.10 Disable instance discoverability | CONFIGURATION MANAGEMENT |
3.1.11 Authenticate federated users at the instance level | ACCESS CONTROL |
3.1.12 Set maximum connection limits - MAX_CONNECTIONS | SYSTEM AND COMMUNICATIONS PROTECTION |
3.1.12 Set maximum connection limits - MAX_COORDAGENTS | SYSTEM AND COMMUNICATIONS PROTECTION |
3.1.12 Set maximum connection limits - MAXAPPLS | SYSTEM AND COMMUNICATIONS PROTECTION |
3.1.13 Set administrative notification level | AUDIT AND ACCOUNTABILITY |
3.1.14 Enable server-based authentication | IDENTIFICATION AND AUTHENTICATION |
3.1.15 Set failed archive retry delay | CONFIGURATION MANAGEMENT |
3.1.16 Auto-restart after abnormal termination | CONFIGURATION MANAGEMENT |
3.1.17 Disable database discovery | CONFIGURATION MANAGEMENT |
3.1.19 Secure permissions for the primary archive log location - LOGARCHMETH1 OS Permissions | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
3.1.19 Secure permissions for the primary archive log location - LOGARCHMETH1 Setting | AUDIT AND ACCOUNTABILITY |
3.1.21 Secure permissions for the secondary archive log location - LOGARCHMETH2 OS Permissions | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
3.1.21 Secure permissions for the secondary archive log location - LOGARCHMETH2 Setting | AUDIT AND ACCOUNTABILITY |
3.1.23 Secure permissions for the tertiary archive log location - FAILARCHPATH OS Permissions | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.1.23 Secure permissions for the tertiary archive log location - FAILARCHPATH Setting | AUDIT AND ACCOUNTABILITY |
3.1.24 Secure permissions for the log mirror location - MIRRORLOGPATH OS Permissions | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
3.1.24 Secure permissions for the log mirror location - MIRRORLOGPATH Setting | AUDIT AND ACCOUNTABILITY |
3.1.25 Establish retention set size for backups | CONTINGENCY PLANNING |
3.1.26 Set archive log failover retry limit | CONFIGURATION MANAGEMENT |
4.3 Review Users, Groups, and Roles - Groups list | ACCESS CONTROL |
4.3 Review Users, Groups, and Roles - Users list | ACCESS CONTROL |
5.3 Enable Automatic Database Maintenance | CONFIGURATION MANAGEMENT |
7.3 Secure SYSMAINT Authority | ACCESS CONTROL |
7.4 Secure SYSMON Authority | ACCESS CONTROL |
9.1 Start and Stop DB2 Instance | ACCESS CONTROL |
9.4 Remove Default Databases | CONFIGURATION MANAGEMENT |
9.5 Enable SSL communication with LDAP server | SYSTEM AND COMMUNICATIONS PROTECTION |
9.6 Secure the permission of the IBMLDAPSecurity.ini file | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.7 Secure the permission of the SSLconfig.ini file | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.9 Secure plug-in library locations - client | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.9 Secure plug-in library locations - group | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.9 Secure plug-in library locations - server | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.11 Ensure permissions on communication exit library locations | ACCESS CONTROL, CONFIGURATION MANAGEMENT |