STIGQter STIGQter: STIG Summary: Database Security Requirements Guide Version: 3 Release: 1 Benchmark Date: 22 Jan 2021:

The DBMS must utilize centralized management of the content captured in audit records generated by all components of the DBMS.

DISA Rule

SV-206589r617447_rule

Vulnerability Number

V-206589

Group Title

SRG-APP-000356

Rule Version

SRG-APP-000356-DB-000314

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure and/or deploy software tools to ensure that DBMS audit records are written directly to or systematically transferred to a centralized log management system.

Check Contents

Review the system documentation for a description of how audit records are off-loaded and how local audit log space is managed.

If the DBMS audit records are not written directly to or systematically transferred to a centralized log management system, this is a finding.

Vulnerability Number

V-206589

Documentable

False

Rule Version

SRG-APP-000356-DB-000314

Severity Override Guidance

Review the system documentation for a description of how audit records are off-loaded and how local audit log space is managed.

If the DBMS audit records are not written directly to or systematically transferred to a centralized log management system, this is a finding.

Check Content Reference

M

Target Key

2902

Comments