U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CIS IBM DB2 10 Benchmark 1.1.0 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
IBM DB2 10 cpe:/a:ibm:db2:10 (View CVEs)

Checklist Highlights

Checklist Name:
CIS IBM DB2 10 Benchmark
Checklist ID:
634
Version:
1.1.0
Type:
Compliance
Review Status:
Final
Authority:
Third Party: Center for Internet Security (CIS)
Original Publication Date:
08/31/2016

Checklist Summary:

This document, Security Configuration Benchmark for IBM DB2, provides prescriptive guidance for establishing a secure configuration posture for DB2 versions 10.x running on Linux and Windows.

Checklist Role:

  • Database Management System

Known Issues:

Not Provided

Target Audience:

This document is intended for system and application administrators, security specialists, auditors, help desk, and platform deployment personnel, who plan to develop, deploy, assess, or secure solutions that incorporate DB2 on Linux and Windows platforms.

Target Operational Environment:

  • Managed

Testing Information:

This guide was tested against DB2 version 10.5 installed on Windows Server 2008 R2 and CentOS 6.

Regulatory Compliance:

Not Provided

Comments/Warnings/Miscellaneous:

Not Provided

Disclaimer:

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International Public License. The link to the license terms can be found at https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode To further clarify the Creative Commons license related to CIS Benchmark content, you are authorized to copy and redistribute the content for use by you, within your organization and outside your organization for non-commercial purposes only, provided that (i) appropriate credit is given to CIS, (ii) a link to the license is provided. Additionally, if you remix, transform or build upon the CIS Benchmark(s), you may only distribute the modified materials if they are subject to the same license terms as the original Benchmark license and your derivative will no longer be a CIS Benchmark. Commercial use of CIS Benchmarks is subject to the prior approval of the Center for Internet Security.

Product Support:

feedback@cisecurity.org

Point of Contact:

feedback@cisecurity.org

Sponsor:

Not Provided

Licensing:

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International Public License. The link to the license terms can be found at https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode To further clarify the Creative Commons license related to CIS Benchmark content, you are authorized to copy and redistribute the content for use by you, within your organization and outside your organization for non-commercial purposes only, provided that (i) appropriate credit is given to CIS, (ii) a link to the license is provided. Additionally, if you remix, transform or build upon the CIS Benchmark(s), you may only distribute the modified materials if they are subject to the same license terms as the original Benchmark license and your derivative will no longer be a CIS Benchmark. Commercial use of CIS Benchmarks is subject to the prior approval of the Center for Internet Security.

Change History:

9FEB2016 - Promote to Final
update to FINAL - 10/11/2016
updated URLs - 8/13/19

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 08/13/2019