Previous Topic: IntroductionNext Topic: About CA Top Secret Option for DB2


Purpose

This guide describes how to secure the IBM DATABASE 2 (DB2) product using CA Top Secret® Option for DB2 (CA Top Secret Option for DB2).

This guide compares native DB2 security with CA Top Secret Option for DB2. It describes the features that replace DB2 internal security. It explains how CA Top Secret Option for DB2 helps you administer and maintain DB2 security. This guide is not intended to replace information that IBM provides with DB2. Its intent is only to summarize this information to the extent that it relates to CA Top Secret Option for DB2.

Security administrators, database administrators (DBAs), and applications programmers should read this guide. Because CA Top Secret® for z/OS (CA Top Secret) security administrators typically coordinate information security at a site and implement CA Top Secret, this guide is critical reading for them. DBAs should read this guide to learn how CA Top Secret Option for DB2 relates to DB2 security concepts and what it means to them. Applications programmers should read “Comparing DB2 and CA Top Secret Option for DB2” chapter to determine what resources they must access when they write DB2 programs.

After reading this guide, security administrators with even a limited knowledge of DB2 should be able to administer CA Top Secret Option for DB2 security, although additional DB2 education is beneficial. Programming experience is not necessary, but some data processing knowledge is helpful. An CA Top Secret Option for DB2 security administrator should have a conceptual understanding of the vocabulary and procedures.