We are running CICS TS 1.3 and also DB2. For auditing and investigation purposes we need to find out periodically...
who may have accessed specific information in DB2 from a CICS transaction. Is there an easy way to tie a specific transaction execution to the data requested from DB2? We have private data that a user may have access to but the information is confidential and we may get reports that they haven't held the information in confidence and we need to find out who may have accessed some very specific data in DB2.
It looks like to me you have a rather open access to DB2 data and you now want to start controlling it.
I'd recommend that you start applying Security to DB2 Tables so that you can actually restrict access rather than worrying about who-did-what after the event.
CICS does not supply any exits or other facilities to intercept data returned from DB2 so that you can log it for offline activity. The closest you can get to this is to look at the SMF data and see what tables are bring accessed - but that will not help you.
I think I'd turn on DB2 Auditing functions and then drive your analysis from that end. Details about this are in the Auditing section of the DB2 Administration book.
Related Q&A from Robert Crawford
With 3270 bridge, you can't stack input messages into one structure. The bridge can't process them all at once. It takes a little more work.continue reading
CICS expert Robert Crawford offers advice on determining the connection between CICS transactions and MQ Queue name.continue reading
CICS expert Robert Crawford discusses if a program can use IXLLIST macros in CICS when IXLLIST are APF.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.