SV-222426r508029_rule
V-222426
SRG-APP-000328
APSC-DV-000470
CAT II
10
Design and configure the application to enforce discretionary access control policies.
Review the application documentation and interview the application administrator.
Review application data protection requirements and application integrated access control methods.
Identify if the application implements discretionary access control to application resources. Discretionary Access Controls (DAC) allows application users to determine and set permissions on application data and application objects. The result is the user is given the ability to control who has access to the data they control.
If the application does not implement discretionary access controls, this requirement is not applicable.
Resources can be a URL, a folder, a file, a process, a database record, or any other application asset that warrants sharing or authorization permission reassignment.
Create 3 test accounts.
Using test account 1 set protection control on a test user 1 controlled resource.
Grant access to test user 2 and only test user 2.
Authenticate as test user 3 and attempt to access the application resource where test user 1 and test user 2 are granted access. Access should be denied.
If the enforcement of configured access restrictions is not performed, this is a finding.
V-222426
False
APSC-DV-000470
Review the application documentation and interview the application administrator.
Review application data protection requirements and application integrated access control methods.
Identify if the application implements discretionary access control to application resources. Discretionary Access Controls (DAC) allows application users to determine and set permissions on application data and application objects. The result is the user is given the ability to control who has access to the data they control.
If the application does not implement discretionary access controls, this requirement is not applicable.
Resources can be a URL, a folder, a file, a process, a database record, or any other application asset that warrants sharing or authorization permission reassignment.
Create 3 test accounts.
Using test account 1 set protection control on a test user 1 controlled resource.
Grant access to test user 2 and only test user 2.
Authenticate as test user 3 and attempt to access the application resource where test user 1 and test user 2 are granted access. Access should be denied.
If the enforcement of configured access restrictions is not performed, this is a finding.
M
4093