CIS IBM DB2 9 Benchmark 3.0.1 Checklist Details (Checklist Revisions)
NOTE
This is not the current revision of this Checklist, view the current revision.
Supporting Resources:
-
Download Prose - CIS IBM DB2 9 Benchmark v3.0.1
- Center for Internet Security (CIS)
Target:
Target | CPE Name |
---|---|
IBM DB2 9 | cpe:/a:ibm:db2:9 (View CVEs) |
Checklist Highlights
- Checklist Name:
- CIS IBM DB2 9 Benchmark
- Checklist ID:
- 665
- Version:
- 3.0.1
- Type:
- Compliance
- Review Status:
- Final
- Authority:
- Third Party: Center for Internet Security (CIS)
- Original Publication Date:
- 03/30/2017
Checklist Summary:
This document, Security Configuration Benchmark for IBM DB2, provides prescriptive guidance for establishing a secure configuration posture for DB2 versions 9.7 or 9.8 running on Linux and Windows.
Checklist Role:
- Database Management System
Known Issues:
Not provided.
Target Audience:
This document is intended for system and application administrators, security specialists, auditors, help desk, and platform deployment personnel, who plan to develop, deploy, assess, or secure solutions that incorporate DB2 on Linux, UNIX, and Windows platforms.
Target Operational Environment:
- Managed
Testing Information:
This guide was tested against DB2 version 9.7 and 9.8 installed on Windows Server 2008 R2 and CentOS 6.
Regulatory Compliance:
Not provided.
Comments/Warnings/Miscellaneous:
Not provided.
Disclaimer:
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International Public License. The link to the license terms can be found at https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode To further clarify the Creative Commons license related to CIS Benchmark content, you are authorized to copy and redistribute the content for use by you, within your organization and outside your organization for non-commercial purposes only, provided that (i) appropriate credit is given to CIS, (ii) a link to the license is provided. Additionally, if you remix, transform or build upon the CIS Benchmark(s), you may only distribute the modified materials if they are subject to the same license terms as the original Benchmark license and your derivative will no longer be a CIS Benchmark. Commercial use of CIS Benchmarks is subject to the prior approval of the Center for Internet Security.
Product Support:
feedback@cisecurity.org
Point of Contact:
feedback@cisecurity.org
Sponsor:
Not provided.
Licensing:
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International Public License. The link to the license terms can be found at https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode To further clarify the Creative Commons license related to CIS Benchmark content, you are authorized to copy and redistribute the content for use by you, within your organization and outside your organization for non-commercial purposes only, provided that (i) appropriate credit is given to CIS, (ii) a link to the license is provided. Additionally, if you remix, transform or build upon the CIS Benchmark(s), you may only distribute the modified materials if they are subject to the same license terms as the original Benchmark license and your derivative will no longer be a CIS Benchmark. Commercial use of CIS Benchmarks is subject to the prior approval of the Center for Internet Security.
Change History:
moved to FINAL - 6/7/2016 update to FINAL - 1/31/2017 Updated to FINAL - 05/05/2017
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|