Secure permissions for the tertiary archive log location Details The failarchpath parameter specifies the type of media and the location used as the tertiary destination for archived logs....
Secure permissions for the tertiary archive log location – FILE_PERMISSIONS Details The failarchpath parameter specifies the type of media and the location used as the tertiary destination for archived logs....
Secure the database container directory Details A DB2 database container is the physical storage of the data. The containers are needed in order for the...
Secure the DB2 Runtime Library Details A DB2 software installation will place all executables under the default sqllib directory. This directory needs to be secured...
Secure the permissions of the IBMLDAPSecurity.ini file Details The IBMLDAPSecurity.ini file contains the IBM LDAP security plug-in configurations. Recommended value is read-only (RO) to Everyone/Other/Users/Domain Users. This...
Secure the permissions of the SSLconfig.ini file Details The SSLconfig.ini file contains the SSL configuration parameters for the DB2 instance, including the password for KeyStore. Recommended value...
Use IP address rather than hostname Details Use an IP address rather than a hostname to connect to the host of the DB2 instance. Using a...
Use non-default account names Details The DB2 service is installed with default accounts with well-known names such as db2admin, db2inst1, dasusr1, or db2fenc1. It...