Securing Db2

Db2 for z/OS® security refers to the protection of sensitive data and system resources by controlling access to Db2 subsystems, objects, and other critical assets through authentication, authorization, and auditing. This interactive model provides an overview of key Db2 security components and processes. Hover over the objects to explore and learn more about the basics of Db2 security in the z/OS environment.

This interactive model provides an overview of key Db2 security components and processes. Hover over the objects to explore and learn more about the basics of Db2 security in the z/OS environment.

Consider using Db2 native facilities for security if you plan to have database administrators manage all database objects and control access to these objects in a Db2 subsystem. Consider using the RACF® access control module for security if you plan to have z/OS system and security administrators control access to database objects in a Db2 subsystem.

Where to find PDF format and online content

The following table shows where to find the PDF format and online content from this section of the Db2 for z/OS product documentation.