STIGQter STIGQter: STIG Summary: Database Security Requirements Guide Version: 2 Release: 9 Benchmark Date: 25 Oct 2019: The DBMS must generate audit records when unsuccessful accesses to objects occur.

DISA Rule

SV-72551r1_rule

Vulnerability Number

V-58121

Group Title

SRG-APP-000507-DB-000357

Rule Version

SRG-APP-000507-DB-000357

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Deploy a DBMS capable of producing the required audit records when object access occurs.

Configure audit settings to create audit records when the specified access to the specified objects is unsuccessfully attempted.

Check Contents

Review DBMS documentation to verify that administrative users can specify database objects for which access must be audited, and can specify which kinds of access must be audited.

If the DBMS is not capable of this, this is a finding.

Review DBMS documentation to determine whether the application owner has specified database objects (tables, views, procedures, functions, etc.) for which access must be audited.

Review the DBMS/database security and audit settings to verify that audit records are created for unsuccessful attempts at the specified access to the specified objects.

If not, this is a finding.

Vulnerability Number

V-58121

Documentable

False

Rule Version

SRG-APP-000507-DB-000357

Severity Override Guidance

Review DBMS documentation to verify that administrative users can specify database objects for which access must be audited, and can specify which kinds of access must be audited.

If the DBMS is not capable of this, this is a finding.

Review DBMS documentation to determine whether the application owner has specified database objects (tables, views, procedures, functions, etc.) for which access must be audited.

Review the DBMS/database security and audit settings to verify that audit records are created for unsuccessful attempts at the specified access to the specified objects.

If not, this is a finding.

Check Content Reference

M

Target Key

2219

Comments