19.06.2013 Views

DB2 UDB for z/OS Version 8 Performance Topics - IBM Redbooks

DB2 UDB for z/OS Version 8 Performance Topics - IBM Redbooks

DB2 UDB for z/OS Version 8 Performance Topics - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Multilevel security with row-level granularity<br />

In this combination, <strong>DB2</strong> grants are used <strong>for</strong> authorization at the <strong>DB2</strong> object level (database,<br />

table, and so <strong>for</strong>th). Multilevel security is implemented only at the row level within <strong>DB2</strong>.<br />

External security is used only by multilevel security itself issuing the RACROUTE. This is the<br />

configuration on which we focus <strong>for</strong> the remainder of this section.<br />

Multilevel security at the object level with external access control<br />

In this combination, external access control, such as the RACF access control module, is<br />

used <strong>for</strong> authorization at the <strong>DB2</strong> object level. In addition, you can now define a proper<br />

hierarchy of security labels <strong>for</strong> <strong>DB2</strong> objects. For example, a database can be defined with a<br />

higher security label than its table spaces. The RACF access control module has been<br />

enhanced to use security labels to per<strong>for</strong>m access checking on <strong>DB2</strong> objects as part of<br />

multilevel security.<br />

Multilevel security with row level granularity with external access control<br />

This option combines both options mentioned above. It uses multilevel security to control the<br />

access to the <strong>DB2</strong> objects, as well as multilevel security (SECLABELs) to control access at<br />

the row level within <strong>DB2</strong>.<br />

In the following sections we describe some of the concepts of multilevel security. Multilevel<br />

security is complex and describing the details of it is beyond the scope of this publication. For<br />

more in<strong>for</strong>mation, refer to the z/<strong>OS</strong> Security Server publications. An introduction can be found<br />

in z/<strong>OS</strong> Planning <strong>for</strong> Multilevel Security and Common Criteria, SA22-7509.<br />

Security label: SECLABEL<br />

A security label (SECLABEL) is defined <strong>for</strong> each object which defines the sensitivity of that<br />

object. This security label indicates the hierarchical level or classification of the in<strong>for</strong>mation<br />

(such as top secret, confidential or general-use), as well as indicates to which<br />

non-hierarchical category the in<strong>for</strong>mation belongs within that level (such as group ABC or<br />

group XYZ).<br />

In RACF you must define two profiles in the RACF SECDATA resource class; one to define<br />

the security levels (SECLEVEL profiles) and the other to define the security categories<br />

(CATEGORY profile) <strong>for</strong> the system.<br />

Security level: SECLEVEL<br />

The hierarchical security level (SECLEVEL) defines the degree of sensitivity of the data. In<br />

the following example, security level, “L0” is defined to be a security level 10. The security<br />

administrator can define up to 254 security levels.<br />

RDEFINE SECDATA SECLEVEL UACC(READ)<br />

RALTER SECDATA SECLEVEL ADDMEM(L0/10 L1/30 L2/50 L3/70 L4/90)<br />

Security category: CATEGORY<br />

The non-hierarchical CATEGORY profile further qualifies the access capability. The security<br />

administrator can define zero or more categories that correspond to some grouping<br />

arrangement in the installation. The CATEGORY profile contains a member <strong>for</strong> each<br />

non-hierarchical category in the system. For example, C1 through C5 are security categories.<br />

RDEFINE SECDATA CATEGORY UACC(READ)<br />

RALTER SECDATA CATEGORY ADDMEM(C1 C2 C3 C4 C5)<br />

Defining Security labels<br />

After defining the SECLEVEL and CATEGORY profiles, the security administrator defines a<br />

profile in the SECLABEL resource class <strong>for</strong> each security label. The SECLABEL is a name of<br />

192 <strong>DB2</strong> <strong>UDB</strong> <strong>for</strong> z/<strong>OS</strong> <strong>Version</strong> 8 Per<strong>for</strong>mance <strong>Topics</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!