Monitoring data access using Db2 traces
Payment Card Industry Data Security Standard (PCIDSS) and similar regulatory standards imply that you monitor database events such as the following:
- Access by privileged users
- Invalid logical access attempts
- Creation and deletion of system-level objects
- Backups
- Access to sensitive data such as credit cards, account numbers, and sensitive health-related information
BMC AMI Defender monitors these and similar types of events, but the events are generated for Db2 only if Db2 is properly configured to start the appropriate traces, as Db2 terms the generation of SMF records for specific event types.
The table in IFCID-descriptions displays the Db2 IFCID number associated with a particular type of event to be monitored, such as privileged user accesses.
BMC usually recommends the use of the traces indicated with a green background in the table, but each installation must evaluate for themselves which traces are appropriate for their particular security and compliance needs.
This section provides information about the following topics :