STIGQter STIGQter: STIG Summary: Database Security Requirements Guide Version: 2 Release: 9 Benchmark Date: 25 Oct 2019: The DBMS must protect its audit features from unauthorized access.

DISA Rule

SV-42734r3_rule

Vulnerability Number

V-32397

Group Title

SRG-APP-000121-DB-000202

Rule Version

SRG-APP-000121-DB-000202

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Apply or modify access controls and permissions (both within the DBMS and in the file system/operating system) to tools used to view or modify audit log data. Tools must be accessible by authorized personnel only.

Check Contents

Review the access permissions to tools used to view or modify audit log data. These tools may include features within the DBMS itself or software external to the database.

If appropriate permissions and access controls to prevent unauthorized access are not applied to these tools, this is a finding.

Vulnerability Number

V-32397

Documentable

False

Rule Version

SRG-APP-000121-DB-000202

Severity Override Guidance

Review the access permissions to tools used to view or modify audit log data. These tools may include features within the DBMS itself or software external to the database.

If appropriate permissions and access controls to prevent unauthorized access are not applied to these tools, this is a finding.

Check Content Reference

M

Target Key

2219

Comments