STIGQter STIGQter: STIG Summary: vRealize - Cassandra Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 05 Jun 2017:

Unused Cassandra database components, software, and database objects must be removed.

DISA Rule

SV-87285r1_rule

Vulnerability Number

V-72653

Group Title

SRG-APP-000141-DB-000091

Rule Version

VROM-CS-000120

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Uninstall unused components or features that are installed and can be uninstalled. Remove any database objects and applications that are installed to support them.

Run the following command from Cassandra host server console:
"rm –rf <path to the unused component directory>".

Check Contents

Review the Cassandra Server to ensure unused database components, software, and database objects are removed.

Open console on server Cassandra DB is hosted on and run following command: "find / | grep "cassandra"". Review the list of files displayed.

If no unused components or features are displayed, this is not a finding. Otherwise, this is a finding.

Vulnerability Number

V-72653

Documentable

False

Rule Version

VROM-CS-000120

Severity Override Guidance

Review the Cassandra Server to ensure unused database components, software, and database objects are removed.

Open console on server Cassandra DB is hosted on and run following command: "find / | grep "cassandra"". Review the list of files displayed.

If no unused components or features are displayed, this is not a finding. Otherwise, this is a finding.

Check Content Reference

M

Target Key

3179

Comments