STIGQter STIGQter: STIG Summary: Database Security Requirements Guide Version: 3 Release: 1 Benchmark Date: 22 Jan 2021:

The DBMS must protect its audit configuration from unauthorized modification.

DISA Rule

SV-206542r617447_rule

Vulnerability Number

V-206542

Group Title

SRG-APP-000122

Rule Version

SRG-APP-000122-DB-000203

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Apply or modify access controls and permissions (both within the DBMS and in the file system/operating system) to tools used to view or modify audit log data. Tools must be configurable by authorized personnel only.

Check Contents

Review the access permissions to tools used to view or modify audit log data. These tools may include features within the DBMS itself or software external to the database.

If appropriate permissions and access controls to prevent unauthorized configuration are not applied to these tools, this is a finding.

Vulnerability Number

V-206542

Documentable

False

Rule Version

SRG-APP-000122-DB-000203

Severity Override Guidance

Review the access permissions to tools used to view or modify audit log data. These tools may include features within the DBMS itself or software external to the database.

If appropriate permissions and access controls to prevent unauthorized configuration are not applied to these tools, this is a finding.

Check Content Reference

M

Target Key

2902

Comments