In the state of Louisiana where I was born and spent some formative years, they often repeat a famous quote: "it ain't braggin' if you can do it".
And in the state of Missouri where I went to college, the unofficial motto is "show me
"Show me, do it". There's no quicker way to separate fact from fiction, truth from falsehood, or request a demonstration. And if all goes well, you might learn something; or at least be entertained!
With that in mind, I am excited to announce the results of a recent project that clearly demonstrates one of the major new database enhancements delivered in IBM i 7.2
Our DB2 for i Center of Excellence team partnered with the IBM International Technical Support Organization (think Redbooks
) and the smart, creative folks in IBM i Development to illuminate and exercise Row and Column Access Control
. The fruit of this labor is an ITSO Redpaper describing design, definition and implementation scenarios of DB2 row permissions and column masks.
If you are interested in establishing effective policies and gaining control of row and column access in a truly data centric way, I want you to do three things:
1. Go here
and watch the brief video explaining the situation, then share it with your business leaders - especially the owners of the data. There is a version in Spanish
as well as in English
2. Go here
and download the DB2 for i Row and Column Access Control Redpaper. Read it. Think about it. Generate awareness in your organization.
3. Identify an executive champion - someone who will have to answer the phone when sensitive data lands on the wrong desk. Initiate a project with assistance from the IBM DB2 for i Center of Excellence team. In other words, point out the problem (unfettered access to all the data), and then suggest the solution (RCAC).
As always, feel free to contact me if you need help with articulating the situation at any level of your organization.
And remember, data is valuable. Please protect it.
Read the original at DB2 for i.