Details
: Information can be either unintentionally or maliciously disclosed or modified during reception, including, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications compromise the confidentiality or integrity of the information.
This requirement applies only to those applications that are either distributed or can allow access to data non-locally. Use of this requirement will be limited to situations where the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process.
When receiving data, the DBMS, associated applications, and infrastructure must leverage protection mechanisms.
Solution
Run the following DB2 command to set the value of ssl_versions to approved TLS or SSL version:
$db2 update dbm cfg using SSL_VERSIONS
Run the following command to set the value of db2comm parameter to SSL:
$db2set db2comm=ssl
Restart the database manager.
Note: Details on key database creation and setting up SSL environment are in the following links
Select the following knowledgebase link for more information regarding configuring SSL support:
http://www.ibm.com/support/knowledgecenter/SSEPGG_10.5.0/com.ibm.db2.luw.admin.sec.doc/doc/t0025241.html?lang=en
Select the following knowledgebase link for more information regarding SSL_versions:
http://www.ibm.com/support/knowledgecenter/SSEPGG_10.5.0/com.ibm.db2.luw.admin.config.doc/doc/r0053616.html?cp=SSEPGG_10.5.0%2F2-4-4-8-88&lang=en
Select the following knowledgebase link for setting communication protocol:
http://www.ibm.com/support/knowledgecenter/SSEPGG_10.5.0/com.ibm.db2.luw.qb.server.doc/doc/t0004714.html?cp=SSEPGG_10.5.0&lang=en
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: System and Communications Protection.This control applies to the following type of system Unix.
References
- 800-53|SC-8(2)
- CAT|II
- CCI|CCI-002422
- Rule-ID|SV-89281r2_rule
- STIG-ID|DB2X-00-009200
- Vuln-ID|V-74607