Planning database file security

There are several steps necessary to create a security plan for your database files.

Structured Query Language (SQL) uses cross-reference files to keep track of database files and their relationships. These files are collectively referred to as the SQL catalog. Public authority to the SQL catalog is *READ. This means that any user who has access to the SQL interface can display the names and text descriptions for all files on your system. The SQL catalog does not affect the normal authority required to access the contents of database files.

Care should be taken when using a CL program that adopts authority to start SQL or Query Manager. Both of these query programs allow users to specify a file name. The user can, therefore, access any file that the adopted profile has authority to.

Planning file security

The information contained in database files is usually the most important asset on your system. The protection of database files will require extra planning, securing, and monitoring.

Planning file security

Securing logical files

Logical files are used to secure fields in database files.

Securing logical files