Steen Rasmussen – Broadcom
Abstract
Are you challenged with having to provide audit reports detailing who has access to which objects and who has which privileges – even worse, who had access 3 months ago? Many Db2 sites are using a log tool to accomplish these tasks – but are you aware of the relatively new capabilities in Db2 dealing with security information stored in the catalog? We will dive into what Db2 has to offer natively and how you can handle regulatory requirements in an easier way augmenting your current processes.