You can secure your Informix® database server and the data that is stored in your Informix databases. You can encrypt data, secure connections, control user privileges and access, and audit data security.
The Informix® Security Guide documents methods for keeping your data secure by preventing unauthorized viewing and altering of data or database objects, including how to use the secure-auditing facility of the database server.
Use network encryption to encrypt data transmitted between server and client, and between server and other server.
This topic offers some generic insights into keystores and how they are used for secure communications with the TLS (Transport Layer Security) protocol. While the first part provides the theoretical background, the second part shows examples for applying this in practice using OpenSSL.
utilities and product directories are secure by default.
You can use the communication support modules (CSMs) to encrypt data transmissions, including distributed queries, over the network.
You can configure network data encryption for Enterprise Replication and high availability clusters by using configuration parameters.
This section explains keystores for TLS/SSL (Transport Layer Security / Secure Socket Layer) connections between database clients and servers.
You can use column-level encryption to store sensitive data in an encrypted format. After encrypting sensitive data, such as credit card numbers, only users who can provide a secret password can decrypt the data.
You can administer the security of the connections to the database server by using authentication and authorization processes.
Discretionary access control verifies whether the user who is attempting to perform an operation has been granted the required privileges to perform that operation.
You can use label-based access control (LBAC), an implementation of multi-level security (MLS), to control who has read access and who has write access to individual rows and columns of data.