Securing data is becoming one of the biggest challenges in any industry today. It is obviously important to protect data access from unauthorized users.
It is also important to track and audit unusual and unnecessary data access from authorized users such as system/database/security administrators and other system users. J.K.Avro superstore is looking for a solution which can track and monitor access to sensitive information
in 'credit_card' table.
To be compliant with PCI standard "Track and monitor all access to network resources and cardholder data", J.K. Avro superstore decides to use the DB2 audit facility to audit any 'credit_card' table access.
DB2 Audit monitors data access and provides information needed for analysis.
This tutorial demonstrates:
1. How to create audit policies
2. How to audit different objects like tables, roles, and authorities
3. How to archive audit data
4. How to extract audit data from archive log
5. Import audit data to audit tables
6. Access and analyze audit data