SV-206573r617447_rule
V-206573
SRG-APP-000243
SRG-APP-000243-DB-000373
CAT II
10
Deploy a DBMS capable of effectively protecting the private resources of one process or user from unauthorized access by another user or process.
Configure the DBMS to effectively protect the private resources of one process or user from unauthorized access by another user or process.
Review the DBMS architecture to find out if and how it protects the private resources of one process or user (such as working memory, temporary tables, uncommitted data) from unauthorized access by another user or process.
If it does not effectively do so, this is a finding.
V-206573
False
SRG-APP-000243-DB-000373
Review the DBMS architecture to find out if and how it protects the private resources of one process or user (such as working memory, temporary tables, uncommitted data) from unauthorized access by another user or process.
If it does not effectively do so, this is a finding.
M
2902