1.5 Configure DB2 to use non-standard ports - Port 523 | CONFIGURATION MANAGEMENT |
1.5 Configure DB2 to use non-standard ports - Port 50000 | CONFIGURATION MANAGEMENT |
2.4 Verify the groups within the DB2_GRP_LOOKUP environment variable are appropriate (Windows only) | ACCESS CONTROL |
2.5 Verify the domains within the DB2DOMAINLIST environment variable are appropriate (Windows only) | ACCESS CONTROL |
3.1.1 Enable audit buffer | AUDIT AND ACCOUNTABILITY |
3.1.2 Encrypt user data across the network | SYSTEM AND COMMUNICATIONS PROTECTION |
3.1.3 Require explicit authorization for cataloging | ACCESS CONTROL |
3.1.4 Disable datalinks support | |
3.1.6 Secure permissions for default database file path | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.1.7 Set diagnostic logging to capture errors and warnings | AUDIT AND ACCOUNTABILITY |
3.1.8 Secure permissions for all diagnostic logs | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.1.9 Require instance name for discovery requests | CONFIGURATION MANAGEMENT |
3.1.10 Disable instance discoverability | CONFIGURATION MANAGEMENT |
3.1.11 Authenticate federated users at the instance level | ACCESS CONTROL |
3.1.12 Set maximum connection limits - MAX_CONNECTIONS | SYSTEM AND COMMUNICATIONS PROTECTION |
3.1.12 Set maximum connection limits - MAX_COORDAGENTS | SYSTEM AND COMMUNICATIONS PROTECTION |
3.1.12 Set maximum connection limits - MAXAPPLS | SYSTEM AND COMMUNICATIONS PROTECTION |
3.1.13 Set administrative notification level | AUDIT AND ACCOUNTABILITY |
3.1.14 Enable server-based authentication | IDENTIFICATION AND AUTHENTICATION |
3.1.15 Set failed archive retry delay | CONFIGURATION MANAGEMENT |
3.1.16 Auto-restart after abnormal termination | CONFIGURATION MANAGEMENT |
3.1.17 Disable database discovery | CONFIGURATION MANAGEMENT |
3.1.19 Secure permissions for the primary archive log location - LOGARCHMETH1 OS Permissions | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
3.1.19 Secure permissions for the primary archive log location - LOGARCHMETH1 Setting | AUDIT AND ACCOUNTABILITY |
3.1.25 Establish retention set size for backups | CONTINGENCY PLANNING |
3.1.26 Set archive log failover retry limit | CONFIGURATION MANAGEMENT |
5.3 Enable Automatic Database Maintenance | CONFIGURATION MANAGEMENT |
7.1 Secure SYSADM authority - SYSADM Group | ACCESS CONTROL |
7.1 Secure SYSADM authority - SYSADM Group Members | |
7.2 Secure SYSCTRL authority | |
7.2 Secure SYSCTRL authority - SYSCTRL Group Members | ACCESS CONTROL |
9.4 Remove Default Databases | CONFIGURATION MANAGEMENT |
9.9 Secure plug-in library locations - client | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.9 Secure plug-in library locations - group | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.9 Secure plug-in library locations - server | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.11 Ensure permissions on communication exit library locations | ACCESS CONTROL, CONFIGURATION MANAGEMENT |