Auditing DB2
No matter how strong our database security is, there is always a possibility of it being penetrated. In case of penetration attempts or other malicious intentions, early detection is crucial.
Therefore, we need to implement auditing to trace and overcome these types of events or other suspicious operations against the database. Auditing is also useful to detect and monitor operations performed in a certain period of time
Getting ready
In this recipe, we will cover how to configure the db2audit
facility for different auditing scopes. Also we will cover how to implement audit policies using the AUDIT
statement.
How to do it...
We will next introduce the main elements of the db2audit
facility.
Configuring auditing scopes
An audit scope is a category of operations related to specific database objects, authorities, and privileges.
In the following table, we have summarized the audit scopes:
Scope |
Description |
---|---|
|
This scope defines auditing of the audit facility. Records are generated... |