STIGQter STIGQter: STIG Summary: Database Security Requirements Guide Version: 3 Release: 1 Benchmark Date: 22 Jan 2021:

The DBMS must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.

DISA Rule

SV-206561r617447_rule

Vulnerability Number

V-206561

Group Title

SRG-APP-000178

Rule Version

SRG-APP-000178-DB-000083

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Modify and configure each non-compliant application, tool, or feature associated with the DBMS/database so that it does not display authentication secrets.

Check Contents

If all interaction with the user for purposes of authentication is handled by a software component separate from the DBMS, this is not a finding.

If any application, tool or feature associated with the DBMS/database displays any authentication secrets (to include PINs and passwords) during - or after - the authentication process, this is a finding.

Vulnerability Number

V-206561

Documentable

False

Rule Version

SRG-APP-000178-DB-000083

Severity Override Guidance

If all interaction with the user for purposes of authentication is handled by a software component separate from the DBMS, this is not a finding.

If any application, tool or feature associated with the DBMS/database displays any authentication secrets (to include PINs and passwords) during - or after - the authentication process, this is a finding.

Check Content Reference

M

Target Key

2902

Comments