DB2 Version 10.1 for Linux, UNIX, and Windows

NIST SP 800-131A compliance in a DB2 instance

DB2® V10.1 Fix Pack 4 adds NIST SP 800-131A compliance. A DB2 instance is not configured by default to comply with NIST SP 800-131A. If you are required to comply with NIST SP 800-131A, you must configure your database instance.

A DB2 instance is strictly compliant with NIST SP 800-131A and encrypts data in-transit when:
Note: For data at rest encryption, you must use InfoSphere Guardium Data Encryption.

Examples

1. Setting instance configuration parameters so that the instance is strictly compliant with NIST SP 800-131A.
  • Set the DB2 registry variable DB2COMM to include SSL.
    DB2SET DB2COMM=TCPIP,SSL
  • Set the DB2 database manager configuration parameter SSL_VERSIONS to TLSV12.
    DB2 UPDATE DBM CFG SSL_VERSIONS=TLSV12
  • Set the database manager configuration parameter SSL_CIPHERSPECS to a symmetric algorithm key length that is greater than or equal to 112.
    DB2 UPDATE DBM CFG SSL_CIPHERSPECS=TLS_RSA_WITH_AES_256_GCM_SHA384
  • Set the database manager configuration parameter SSL_SVC_LABEL to a certificate with RSA key length that is greater than or equal to 2048. That certificate must also have a digital signature with minimum SHA2.
    gsk8capicmd_64 -cert … -size 2048 -sigalg SHA256WithRSA -label "myselfsigned_SHA2_2K" ...
    DB2 UPDATE DBM CFG SSL_SVR_LABEL=myselfsigned_SHA_2K
These settings ensure that all connections over SSL in any CLP or Java™ application strictly adhere to NIST SP 800-131A.
2. Setting instance configuration parameters to take advantage of TLS 1.2 support, and be ready to fall back to TLS 1.1 or 1.0.
  • Set the DB2 registry variable DB2COMM to include SSL.
    DB2SET DB2COMM=TCPIP,SSL
  • Set the DB2 database manager configuration parameter SSL_VERSIONS to TLSV12, TLSV1.
    DB2 UPDATE DBM CFG SSL_VERSIONS=TLSV12,TLSV1