Securing Db2 for z/OS Data: Encryption and Much More
Robert Catterall, IBM

Download PDF

How can you effectively secure Db2 for z/OS-managed data? Encryption is an important part of that story, but there’s more – plenty more. In this 2-part session you’ll learn about various aspects of Db2 data encryption, and you’ll also learn the importance of privilege management, client authentication, column masks, row permissions. auditing, application architecture, test data management, and RACF (or equivalent) management of Db2-internal security.