Introduction to the DB2 audit facility
To manage access to your sensitive data, you can use a
variety of authentication and access control mechanisms to establish
rules and controls for acceptable data access. But to protect against
and discover unknown or unacceptable behaviors you can monitor data
access by using the DB2 audit
facility.