SV-222424r508029_rule
V-222424
SRG-APP-000324
APSC-DV-000450
CAT II
10
Utilize and implement data mining protections when requirements specify it.
Review the security plan, application and system documentation and interview the application administrator to identify data mining protections that are required of the application.
If there are no data mining protections required, this requirement is not applicable.
Review the application authentication requirements and permissions.
Review documented protections that have been established to protect from data mining.
This can include limiting the number of queries allowed.
Automated alarming on atypical query events.
Limiting the number of records allowed to be returned in a query.
Not allowing data dumps.
If the application requirements specify protections for data mining and the application administrator is unable to identify or demonstrate that the protections are in place, this is a finding.
V-222424
False
APSC-DV-000450
Review the security plan, application and system documentation and interview the application administrator to identify data mining protections that are required of the application.
If there are no data mining protections required, this requirement is not applicable.
Review the application authentication requirements and permissions.
Review documented protections that have been established to protect from data mining.
This can include limiting the number of queries allowed.
Automated alarming on atypical query events.
Limiting the number of records allowed to be returned in a query.
Not allowing data dumps.
If the application requirements specify protections for data mining and the application administrator is unable to identify or demonstrate that the protections are in place, this is a finding.
M
4093