Introduction
Today, we live in a world where there seems to be an equal proportion between defense and attack methods. We can have the most calibrated and well-designed database in the world; all is in vain if it can be compromised at any time.
Most companies that develop and sell database systems tend to allocate a lot of effort to developing security products within and around their products. This field can make a difference in today's fierce competition. These companies, including IBM, have invested heavily in tools and methods for securing DB2. In the following recipes, we will cover some of them, such as authorizations, roles, encryption, LBAC, and auditing.