LDL0062 DB VA Guardium
LDL0062 DB VA Guardium
TRADEMARKS
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many
jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM
trademarks is available on the web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml.
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems
Incorporated in the United States, and/or other countries.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds,
owner of the mark on a worldwide basis.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries,
or both.
Firefox is a trademark of the Mozilla Foundation in the US and other countries.
UNIX is a registered trademark of The Open Group in the United States and other countries.
VMware, the VMware logo, VMware Cloud Foundation, VMware Cloud Foundation Service, VMware vCenter Server, and VMware
vSphere are registered trademarks or trademarks of VMware, Inc. or its subsidiaries in the United States and/or other jurisdictions.
Red Hat®, JBoss®, OpenShift®, Fedora®, Hibernate®, Ansible®, CloudForms®, RHCA®, RHCE®, RHCSA®, Ceph®, and Gluster® are
trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the United States and other countries.
Guardium vulnerability assessment uses multiple information sources, including direct scanning
and integration with the configuration audit system agent. Guardium provides predefined tests to
selectively add to security assessments, and users can define custom tests as well.
Important: These exercises are presented in a virtual lab format. A virtual lab is an interactive
simulation of the original virtual machines. A virtual lab is not an actual virtual machine.
Therefore, your interaction opportunities are restricted to the exercise steps with some minor
variance. You use this lab guide, which walks you through usage and responses for the
components that are taught.
You can run the virtual lab multiple times without restriction.
In this exercise, you verify that the admin user has the vulnerability assessment role and access to
the vulnerability assessment tools.
1. To start the Guardium GUI, double-click the Firefox icon on the desktop.
A web browser opens with two tabs: One for the central manager, MA170, and one for the
collector, C175. You must change the roles on the central manager.
2. To access the Guardium GUI, log in to MA170 as user accessmgr with password guardium.
The welcome center opens.
2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 1 Grant appropriate permissions to create and run security assessments
Uempty
The User Browser opens.
3
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 1 Grant appropriate permissions to create and run security assessments
Uempty
5. To enable vulnerability assessment for user labadmin, select the vulnerability-assess role,
and click Save.
6. To log out as user accessmgr, locate the account menu and click Sign Out.
4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 2 Create and run a security assessment
Uempty
Exercise 2 Create and run a security
assessment
After you verify that the Guardium user has the correct role, you create, configure, and run a
security assessment. A security assessment is associated with a datasource or a group of
datasources. Each datasource contains the connection information that Guardium needs to
access and run tests on a database. Add Guardium predefined tests to control what the
assessment checks.
Generally, an assessment is an iterative process. You develop an action plan that prioritizes which
vulnerabilities to concentrate on. The assessment is run periodically, and assessment results
detail the progress in remediating vulnerabilities. After you fix the highest priority problems, you
can address the lower priority tests.
In this exercise, you log in to the collector to create and use the assessment.
1. In the browser, click the IBM Guardium (C175) tab.
3. To begin the assessment, in the left navigation menu, go to Harden > Vulnerability
Assessment > Assessment Builder.
5
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 2 Create and run a security assessment
Uempty
The Security Assessment Finder window opens.
6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 2 Create and run a security assessment
Uempty
The Security Assessment Builder window opens.
7
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 2 Create and run a security assessment
Uempty
The Select datasource window opens.
You now create a new datasource for this vulnerability assessment. The datasource provides
Guardium with information to create the database connection that is used to run the
assessment. You must create the datasource even if an S-TAP agent is on the database server.
8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 2 Create and run a security assessment
Uempty
The Create datasource dialog opens.
9
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 2 Create and run a security assessment
Uempty
The Create datasource dialog displays more options.
10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 2 Create and run a security assessment
Uempty
11. Scroll down and click Save.
11
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 2 Create and run a security assessment
Uempty
The new datasource is displayed in the Select datasource dialog.
14. To select the new datasource, select the checkbox on the left side of osprey_db2inst1 and
click Save.
The datasource is added to the security assessment.
12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 2 Create and run a security assessment
Uempty
The Assessment Test Selections window opens.
17. To filter the tests, select severity Critical and deselect Include CAS.
13
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 2 Create and run a security assessment
Uempty
Critical tests for the IBM Db2 Database are displayed.
19. To select all critical tests, click the first test in the list, scroll down, press the Shift key, and
click the last test on the list.
All of the selected tests are highlighted.
14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 2 Create and run a security assessment
Uempty
The tests are added to the Security Assessment.
21. To return to the Security Assessment Finder window, scroll down and click Return.
The new assessment opens.
15
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 2 Create and run a security assessment
Uempty
22. To run the security assessment, click Run Once Now.
23. On the confirmation window that indicates the test is in the Guardium job queue, click OK.
24. In the left navigation menu, go to Harden > Vulnerability Assessment > Guardium Job
Queue.
The Guardium Job Queue opens.
25. If the job does not have a status of completed, click the Refresh icon ( ).
Note: In a production environment, it might take a few minutes for the job queue to run.
26. View a comprehensive report available through the Security Assessment Builder.
a. In the left navigation menu, go to Harden > Vulnerability Assessment >
Assessment Builder.
16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 2 Create and run a security assessment
Uempty
A new window opens with the assessment results.
17
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 2 Create and run a security assessment
Uempty
28. Explore the various features of the report.
a. Click Filter / Sort Control.
b. In the Show only window, select Fail from the Score column, and click Apply.
Note that the results are filtered to show only assessment failures.
18
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 3 Use the report to harden database and validate assessment
Uempty
d. To download a PDF of the security assessment, click Download PDF and click OK to close
the open window. Then, select Open with Document viewer (default) and click OK.
29. To return to the browser version of the report, close the PDF.
19
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 3 Use the report to harden database and validate assessment
Uempty
In this exercise, you use the report to harden your database.
1. In the security assessment report, scroll through the assessment test results.
2. Notice that the tests that failed have recommendations, including suggested commands, to fix
the vulnerability.
3. Locate the third and fourth assessment tests with the following names:
– No PUBLIC access to SYSCAT.AUDITPOLICIES and SYSIBM.SYSAUDITPOLICIES
– No PUBLIC access to SYSCAT.AUDITUSE and SYSIBM.SYSAUDITUSE
Note the cause of failure and the recommendations, which include the database commands to
remediate the failures.
5. To start a Secure Shell session to the database server, use the following command:
ssh [email protected]
20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 3 Use the report to harden database and validate assessment
Uempty
7. To enter the Db2 command environment, use the db2 command.
9. Apply the recommendations from the two tests in step 3. Recommendations often contain two
commands to run, separated by a period. In this case, run them as two separate commands.
This example shows one long command:
REVOKE ALL ON SYSCAT.AUDITPOLICIES FROM PUBLIC. REVOKE ALL ON
SYSIBM.SYSAUDITPOLICIES FROM PUBLIC
21
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 3 Use the report to harden database and validate assessment
Uempty
Instead, run each command separately and remove the periods at the end:
REVOKE ALL ON SYSIBM.SYSAUDITPOLICIES FROM PUBLIC
REVOKE ALL ON SYSCAT.AUDITPOLICIES FROM PUBLIC
REVOKE ALL ON SYSCAT.AUDITUSE FROM PUBLIC
REVOKE ALL ON SYSIBM.SYSAUDITUSE FROM PUBLIC
Now you run the security assessment again to see how your remediation efforts affect the
assessment results.
10. To return Guardium, select the IBM Guardium (C175) tab in the taskbar.
The Security assessment Finder opens.
12. On the confirmation window that indicates the test is in the Guardium job queue, click OK.
13. In the left navigation menu, go to Harden > Vulnerability Assessment > Guardium Job
Queue.
14. To view the results, go to Harden > Vulnerability Assessment > Assessment Builder.
The Security Assessment Finder opens.
22
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 3 Use the report to harden database and validate assessment
Uempty
The new security assessment report opens.
\
The result summary shows an improvement in the pass rate. The Assessment Result History
graph displays the progress.
16. To filter the results to show only tests that have a status of Pass, click Filter / Sort Controls.
17. To configure the filter, from the Score column, select Pass, and click Apply.
23
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 4 Creating a test exception
Uempty
18. Scroll down and view the details of the vulnerabilities you addressed.
24
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 4 Creating a test exception
Uempty
A new window opens with the test details.
4. Select SYSTS_USR.
25
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 4 Creating a test exception
Uempty
The Add Exception link is enabled.
6. Click the End date calender icon and choose the date 2/28/2025
26
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 4 Creating a test exception
Uempty
7. For End date time, choose 1 :00 AM
9. Click Save.
27
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
V7.0
Exercises
Exercise 4 Creating a test exception
Uempty
The Db2 Roles granted to PUBLIC report details window now displays the test exception.
28
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
© Copyright IBM Corp. 2022