

Implementing Security for DB2 › Implementation Strategy
Implementation Strategy
Implement DB2 security in stages:
- Focus on the production subsystems and gradually work towards the test subsystems. Start with subsystem protection. Define who can access each DB2 subsystem, and then turn on protection for that subsystem.
- Permit access to the data objects and selectively turn on default protection for the DB2‑related resource classes.
- Define protection and permit access to the system objects.
- Follow the same mode strategy defined for other facilities. However, the mode setting used is that of the mode of the facility associated with the DB2 subsystem.
As soon as the CA Top Secret base product is installed, you can start defining DB2 resources and permitting access to them. CA Top Secret for DB2 does not have to be installed until you are ready to activate your definitions.
Copyright © 2013 CA Technologies.
All rights reserved.
 
|
|