Information
The SYSCAT.SEQUENCEAUTH view contains users, groups, or roles granted privilege(s) on a sequence. It is recommended that the PUBLIC role be restricted from accessing this view.
Rationale:
PUBLIC should not have access to see all the granted access of a sequence in the database because this could be used as a point of exploit.
Solution
Perform the following to revoke access from PUBLIC.
Connect to the Db2 database.
db2 => connect to <dbname>
Run the following command:
db2 => REVOKE SELECT ON SYSCAT.SEQUENCEAUTH FROM PUBLIC