STIGQter STIGQter: STIG Summary: Database Security Requirements Guide Version: 3 Release: 1 Benchmark Date: 22 Jan 2021:

The DBMS must protect its audit features from unauthorized removal.

DISA Rule

SV-206543r617447_rule

Vulnerability Number

V-206543

Group Title

SRG-APP-000123

Rule Version

SRG-APP-000123-DB-000204

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Apply or modify access controls and permissions (both within the DBMS and in the file system/operating system) to tools used to view or modify audit log data. Ensure that tools may be removed by authorized personnel only.

Check Contents

Review the access permissions to tools used to view or modify audit log data. These tools may include features within the DBMS itself or software external to the database.

If appropriate permissions and access controls to prevent unauthorized removal are not applied to these tools, this is a finding.

Vulnerability Number

V-206543

Documentable

False

Rule Version

SRG-APP-000123-DB-000204

Severity Override Guidance

Review the access permissions to tools used to view or modify audit log data. These tools may include features within the DBMS itself or software external to the database.

If appropriate permissions and access controls to prevent unauthorized removal are not applied to these tools, this is a finding.

Check Content Reference

M

Target Key

2902

Comments