Best practices: Step by step instructions to configure a secure database system

Download PDF
Watch recording (logged in Tridex members only)

Session title: Best practices: Step by step instructions to configure a secure database system

Session abstract: From installation to rolling into production ; security impacts every step of setting up a database system. From the OS ; to authentication ; authorization ; encryption and auditing ; a locked down database is a necessity in today’s world.

Best practices for each of these areas will be discussed ; and a practical example setup will be presented. You will learn how to take a bare Linux system and turn it into a hardened database server.
 

Speaker biography: Greg Stager is the security architect for Db2 LUW at the IBM Toronto Lab. Greg has been a member of the Db2 security development team since 2000, where he has worked on all aspects of security within Db2, including authentication, authorization, auditing and encryption.