×
The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.
On 03/04/2009, at 8:29 AM, Eftimios Pantzopoulos wrote:
The company I'm working for has asked me whether it's possible to
track all accesses to a file which contains an (encrypted) credit
card number.
From my research I've discovered that there is a READ trigger on
the iSeries DB2 but it is highly recommended that it not be used,
which I can understand.
Investigate column-level security. This won't help with authorised
access but may help restrict those users who need to access data in
other columns in the file.
Read Triggers were intended to audit access to sensitive information
such as medical records so it would seem that this is another case
where they are appropriate. The performance issue is a potential
concern but if all the trigger does is log access to another file or
add a user-entry to a journal (safer from an audit perspective) then
really each read will result in one dynamic call plus one I/O
operation. Many applications do more than that on a read so you may
find the performance penalty is not significant. Just don't have the
trigger page, e-mail, or fax someone about unauthorised access!.
I've also come across a reference to a DB2 audit function, but
unfortunately, only for the LUW version of DB2 (http://publib.boulder.ibm.com/infocenter/db2luw/v8/index.jsp?topic=/com.ibm.db2.udb.doc/admin/t0011540.htm
)
I went searching for the function in iSeries DB2 and couldn't find
it. Can anyone tell me if it exists, where any good documentation
for it is, or if not, any alternatives to tracking access to
important data.
This says "log file". A log file in LUW land is equivalent to a
journal. So journal the file to log access to the file. A skim through
the referenced URL indicates that the audit information does not go
down to the read level. The various audit functions seem to equate to
OS/400 system auditing. I suspect the LUW audit function won't solve
your problem.
Perhaps there are better techniques using normal iSeries authority?
All you can do here is restrict unauthorised access. Tracking what
authorised persons do requires different techniques. The answer to the
initial question (Is it possible to track all access) is YES but you
need to determine the real concern. They (and they know who they are)
want to know who accessed credit-card details but WHY do they want to
know that? What is the problem they're trying to solve? Knowing that
will lead to either a better solution or the only solution.
Regards,
Simon Coulter.
--------------------------------------------------------------------
FlyByNight Software OS/400, i5/OS Technical Specialists
http://www.flybynight.com.au/
Phone: +61 2 6657 8251 Mobile: +61 0411 091 400 /"\
Fax: +61 2 6657 8251 \ /
X
ASCII Ribbon campaign against HTML E-Mail / \
--------------------------------------------------------------------
As an Amazon Associate we earn from qualifying purchases.