STIGQter STIGQter: STIG Summary: Database Security Requirements Guide Version: 2 Release: 9 Benchmark Date: 25 Oct 2019: The DBMS must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.

DISA Rule

SV-72561r1_rule

Vulnerability Number

V-58131

Group Title

SRG-APP-000516-DB-000363

Rule Version

SRG-APP-000516-DB-000363

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the DBMS in accordance with DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs and IAVMs.

Check Contents

Review the DBMS documentation and configuration to determine if the DBMS is configured in accordance with DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs and IAVMs.

If the DBMS is not configured in accordance with security configuration settings, this is a finding.

Vulnerability Number

V-58131

Documentable

False

Rule Version

SRG-APP-000516-DB-000363

Severity Override Guidance

Review the DBMS documentation and configuration to determine if the DBMS is configured in accordance with DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs and IAVMs.

If the DBMS is not configured in accordance with security configuration settings, this is a finding.

Check Content Reference

M

Target Key

2219

Comments