The third step to audit SQL DB2 access and usage is to utilize the built-in tools and features of the database that can help you monitor and control data access and usage. For example, you can use the db2pd command to obtain information about database processes, connections, locks, transactions, buffer pools, and other aspects of the database status and performance. The db2diag command displays diagnostic messages and error codes related to the database operations and errors. Additionally, the db2top and db2mon utilities provide a graphical or command-line interface for viewing and analyzing the database activity and performance in real time. Moreover, you can use the db2advis utility to receive recommendations for improving the database design, configuration, and performance based on the query workload. Furthermore, Access Control Lists (ACLs), Label-Based Access Control (LBAC), Row and Column Access Control (RCAC), and Data Encryption can be used to define permissions, privileges, security labels, policies, rules, masks, encryption for accessing specific database objects such as tables, views, indexes, routines, or data.