Information
A Trusted Context can provide a middle tier with the option of performing end user authentication, and then switching to that user within the database without further authentication. The middle tier is asserting the identity of the end user they have already authenticated. The organizations Standard Operating Procedures (SOP) will determine whether such trust has been placed with the middle tier establishing the trusted connection.
Rationale:
Allowing an untrusted middle tier to establish a trusted context and switch users without authentication is a security risk. Only middle tier applications that have been validated and included in the SOP should have this functionality enabled. All other trusted contexts should not use with WITHOUT AUTHENTICATION clause during the CREATE TRUSTED CONTEXT statement.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
Connect to the Db2 database.
db2 => connect to <dbname>
Disable any trusted context identified above until it can be determined why such trusted context where created with the following command
db2 => alter trusted context <contextname> alter disable