Database data protection and monitoring

To ensure data integrity and consistency, you can enforce either business rules or data type rules.

You can enforce business rules using the following methods:
  • Referential constraints let you put controls (constraints) on data in files you define as having a mutual dependency. A referential constraint lets you specify rules to be followed when changes are made to files with constraints.
  • Triggers let you run your own program to take any action or evaluate changes when files are changed. When predefined changes are made or attempted, a trigger program is run.
  • Row and column access control (RCAC) adds an additional layer of data security. RCAC allows access to a table at the row level, column level, or both with the use of permissions and masks. RCAC can be used to complement the table privileges model.

The system performs data type checking in certain instances to ensure, for example, that data in a numeric field is really numeric.

In addition, the system protects data from loss using the following methods:
  • Journaling and commitment control functions
  • System-managed access path protection (SMAPP) support