No matter how strong our database security is, there is always a possibility of it being penetrated. In case of penetration attempts or other malicious intentions, early detection is crucial.
Therefore, we need to implement auditing to trace and overcome these types of events or other suspicious operations against the database. Auditing is also useful to detect and monitor operations performed in a certain period of time
In this recipe, we will cover how to configure the db2audit
facility for different auditing scopes. Also we will cover how to implement audit policies using the AUDIT
statement.
We will next introduce the main elements of the db2audit
facility.