Skip to content

IBM DB2 V10.5 LUW Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • DB2 must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations.

    <VulnDiscussion>Use of weak or not validated cryptographic algorithms undermines the purposes of utilizing encryption and digital signatures ...
    Rule High Severity
  • SRG-APP-000211-DB-000122

    <GroupDescription></GroupDescription>
    Group
  • DB2 must separate user functionality (including user interface services) from database management functionality.

    &lt;VulnDiscussion&gt;Information system management functionality includes functions necessary to administer databases, network components, worksta...
    Rule Medium Severity
  • SRG-APP-000224-DB-000384

    <GroupDescription></GroupDescription>
    Group
  • DB2 must maintain the authenticity of communications sessions by guarding against man-in-the-middle attacks that guess at Session ID values.

    &lt;VulnDiscussion&gt;One class of man-in-the-middle, or session hijacking, attack involves the adversary guessing at valid session identifiers bas...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules