STIGQter STIGQter: STIG Summary: Database Security Requirements Guide Version: 2 Release: 9 Benchmark Date: 25 Oct 2019: The DBMS must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to the DBMS.

DISA Rule

SV-42752r3_rule

Vulnerability Number

V-32415

Group Title

SRG-APP-000133-DB-000179

Rule Version

SRG-APP-000133-DB-000179

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Implement procedures to monitor for unauthorized changes to DBMS software libraries, related software application libraries, and configuration files. If a third-party automated tool is not employed, an automated job that reports file information on the directories and files of interest and compares them to the baseline report for the same will meet the requirement.

Use file hashes or checksums for comparisons, as file dates may be manipulated by malicious users.

Check Contents

Review monitoring procedures and implementation evidence to verify monitoring of changes to database software libraries, related applications, and configuration files is done.

Verify the list of files, directories, and database application objects (procedures, functions, and triggers) being monitored is complete.

If monitoring does not occur or is not complete, this is a finding.

Vulnerability Number

V-32415

Documentable

False

Rule Version

SRG-APP-000133-DB-000179

Severity Override Guidance

Review monitoring procedures and implementation evidence to verify monitoring of changes to database software libraries, related applications, and configuration files is done.

Verify the list of files, directories, and database application objects (procedures, functions, and triggers) being monitored is complete.

If monitoring does not occur or is not complete, this is a finding.

Check Content Reference

M

Target Key

2219

Comments