Database Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +22 −4 ✎ 5
Comparison against the immediately-prior release (V3R4). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 22
- V-263602 Medium The DBMS must disable accounts when the accounts have expired.
- V-263603 Medium The DBMS must disable accounts when the accounts are no longer associated to a user.
- V-263604 Medium The DBMS must implement the capability to centrally review and analyze audit records from multiple components within the system.
- V-263605 Medium The DBMS must alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information.
- V-263606 Medium The DBMS must prevent the installation of organization-defined software and firmware components without verification that the component has been digitally signed using a certificate recognized and approved by the organization.
- V-263607 Medium The DBMS must require users to be individually authenticated before granting access to the shared accounts or resources.
- V-263608 Medium The DBMS must implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- V-263609 Medium The DBMS must implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.
- V-263610 Medium The DBMS must, for password-based authentication, maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency.
- V-263611 Medium The DBMS must, for password-based authentication, update the list of passwords on an organization-defined frequency.
- V-263612 Medium The DBMS must, for password-based authentication, update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly.
- V-263613 Medium The DBMS must, for password-based authentication, verify that when users create or update passwords, the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a).
- V-263614 Medium The DBMS must, for password-based authentication, require immediate selection of a new password upon account recovery.
- V-263615 Medium The DBMS must, for password-based authentication, allow user selection of long passwords and passphrases, including spaces and all printable characters.
- V-263616 Medium The DBMS must, for password-based authentication, employ automated tools to assist the user in selecting strong password authenticators.
- V-263617 Medium The DBMS must, for public key-based authentication, implement a local cache of revocation data to support path discovery and validation.
- V-263618 Medium The DBMS must protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths.
- V-263619 Medium The DBMS must include only approved trust anchors in trust stores or certificate stores managed by the organization.
- V-263620 Medium The DBMS must provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.
- V-263621 Medium The DBMS must synchronize system clocks within and between systems or system components.
- V-263622 Medium The DBMS must compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source.
- V-265854 High DBMS products must be a version supported by the vendor.
Removed rules 4
- V-206589 Medium The DBMS must utilize centralized management of the content captured in audit records generated by all components of the DBMS.
- V-206590 Medium The DBMS must provide centralized configuration of the content to be captured in audit records generated by all components of the DBMS.
- V-206600 Medium The DBMS must require users to re-authenticate when organization-defined circumstances or situations require re-authentication.
- V-251182 High DBMS products must be a version supported by the vendor.
Content changes 5
- V-206555 High descriptioncheckfix If DBMS authentication, using passwords, is employed, the DBMS must enforce the DOD standards for password complexity and lifetime.
- V-206556 High descriptionfix The DBMS must for password-based authentication, store passwords using an approved salted key derivation function, preferably using a keyed hash.
- V-206596 Medium checkfix The DBMS must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
- V-206598 Medium check The DBMS must produce audit records of its enforcement of access restrictions associated with changes to the configuration of the DBMS or database(s).
- V-206611 Medium description Security-relevant software updates to the DBMS must be installed within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-APP-000001-DB-000031
- Vuln IDs
-
- V-206519
- V-32157
- Rule IDs
-
- SV-206519r960735_rule
- SV-42474
Checks: C-6779r291225_chk
Determine whether the system documentation specifies limits on the number of concurrent DBMS sessions per account by type of user. If it does not, assume a limit of 10 for database administrators and 2 for all other users. Review the concurrent-sessions settings in the DBMS and/or the applications using it, and/or the system software supporting it. If the DBMS is capable of enforcing this restriction but is not configured to do so, this is a finding. This holds even if the restriction is enforced by applications or supporting software. If it is not technically feasible for the DBMS to enforce this restriction, but the application(s) or supporting software are configured to do so, this is not a finding. If it is not technically feasible for the DBMS to enforce this restriction, and applications and supporting software are not so configured, this is a finding. If the value for any type of user account is not set, this is a finding. If a value is set but is not equal to the value specified in the documentation (or the default value defined in this check) for the type of user, this is a finding.
Fix: F-6779r291226_fix
If the DBMS is capable of enforcing this restriction, but is not configured to do so, configure it to do so. (This may involve the development of one or more triggers.) If it is not technically feasible for the DBMS to enforce this restriction, and the application(s) and supporting software are not configured to do so, configure them to do so. If the value for any type of user account is not set, determine the correct value and set it. If a value is set but is not equal to the value specified for the type of user, determine the correct value, set it, and update the documentation, as appropriate.
- RMF Control
- AC-2
- Severity
- H
- CCI
- CCI-000015
- Version
- SRG-APP-000023-DB-000001
- Vuln IDs
-
- V-206520
- V-32192
- Rule IDs
-
- SV-206520r960768_rule
- SV-42509
Checks: C-6780r291228_chk
If all accounts are authenticated by the organization-level authentication/access mechanism and not by the DBMS, this is not a finding. If there are any accounts managed by the DBMS, review the system documentation for justification and approval of these accounts. If any DBMS-managed accounts exist that are not documented and approved, this is a finding.
Fix: F-6780r291229_fix
Integrate DBMS security with an organization-level authentication/access mechanism providing account management for all users, groups, roles, and any other principals. For each DBMS-managed account that is not documented and approved, either transfer it to management by the external mechanism, or document the need for it and obtain approval, as appropriate.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- SRG-APP-000033-DB-000084
- Vuln IDs
-
- V-206521
- V-32203
- Rule IDs
-
- SV-206521r960792_rule
- SV-42520
Checks: C-6781r291231_chk
Check DBMS settings to determine whether users are restricted from accessing objects and data they are not authorized to access. If appropriate access controls are not implemented to restrict access to authorized users and to restrict the access of those users to objects and data they are authorized to see, this is a finding.
Fix: F-6781r291232_fix
Configure the DBMS settings and access controls to permit user access only to objects and data that the user is authorized to view or interact with, and to prevent access to all other objects and data.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- SRG-APP-000080-DB-000063
- Vuln IDs
-
- V-206522
- V-32347
- Rule IDs
-
- SV-206522r960864_rule
- SV-42684
Checks: C-6782r291234_chk
Review system documentation to determine the data and the actions on data that need to be protected from repudiation by means of audit trails. Review DBMS settings to determine whether users can be identified as individuals when using shared accounts. If the individual user who is using a shared account cannot be identified, this is a finding. Review the design and the contents of the application data tables. If they do not include the necessary audit data, this is a finding. Review the configuration of audit logs to determine whether auditing includes details identifying the individual user. If it does not, this is a finding.
Fix: F-6782r291235_fix
Use accounts assigned to individual users. Where the application connects to the DBMS using a standard, shared account, ensure that it also captures the individual user identification and passes it to the DBMS. Modify application database tables and all supporting code to capture the necessary audit data. Modify the configuration of audit logs to include details identifying the individual user.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- SRG-APP-000089-DB-000064
- Vuln IDs
-
- V-206523
- V-32362
- Rule IDs
-
- SV-206523r960879_rule
- SV-42699
Checks: C-6783r291237_chk
Check DBMS auditing to determine whether organization-defined auditable events are being audited by the system. If organization-defined auditable events are not being audited, this is a finding.
Fix: F-6783r291238_fix
Deploy a DBMS that supports the DoD minimum set of auditable events. Configure the DBMS to generate audit records for at least the DoD minimum set of events.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- SRG-APP-000090-DB-000065
- Vuln IDs
-
- V-206524
- V-32363
- Rule IDs
-
- SV-206524r960882_rule
- SV-42700
Checks: C-6784r291240_chk
Check DBMS settings and documentation to determine whether designated personnel are able to select which auditable events are being audited. If designated personnel are not able to configure auditable events, this is a finding.
Fix: F-6784r291241_fix
Configure the DBMS's settings to allow designated personnel to select which auditable events are audited.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000091-DB-000066
- Vuln IDs
-
- V-206525
- V-32364
- Rule IDs
-
- SV-206525r960885_rule
- SV-42701
Checks: C-6785r291243_chk
Review DBMS documentation to verify that audit records can be produced when privileges/permissions/role memberships are retrieved. If the DBMS is not capable of this, this is a finding. If the DBMS is currently required to audit the retrieval of privilege/permission/role membership information, review the DBMS/database security and audit configurations to verify that audit records are produced when privileges/permissions/role memberships are retrieved. If they are not produced, this is a finding.
Fix: F-6785r291244_fix
Deploy a DBMS capable of producing the required audit records when privileges/permissions/role memberships are retrieved. If currently required, configure the DBMS to produce audit records when privileges/permissions/role memberships are retrieved.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000091-DB-000325
- Vuln IDs
-
- V-206526
- V-58069
- Rule IDs
-
- SV-206526r960885_rule
- SV-72499
Checks: C-6786r291246_chk
Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to retrieve privileges/permissions/role membership. If the DBMS is not capable of this, this is a finding. If the DBMS is currently required to audit the retrieval of privilege/permission/role membership information, review the DBMS/database security and audit configurations to verify that audit records are produced when the DBMS denies retrieval of privileges/permissions/role memberships. If they are not produced, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent retrieval of privileges/permissions/role memberships. If they are not produced, this is a finding.
Fix: F-6786r291247_fix
Deploy a DBMS capable of producing the required audit records when it denies or fails to complete access to privileges/permissions/role membership. If currently required, configure the DBMS to produce audit records when it denies access to privileges/permissions/role membership. Configure the DBMS to produce audit records when other errors prevent access to privileges/permissions/role membership.
- RMF Control
- AU-14
- Severity
- M
- CCI
- CCI-001464
- Version
- SRG-APP-000092-DB-000208
- Vuln IDs
-
- V-206527
- V-32365
- Rule IDs
-
- SV-206527r960888_rule
- SV-42702
Checks: C-6787r291249_chk
Review DBMS vendor documentation to determine whether the DBMS software is capable of session auditing. If the DBMS is not capable of session auditing and a third party product is not being used for session level auditing, this is a finding. If the DBMS is capable of session level auditing and specific session audits are currently defined but session auditing is not enabled; or if a third-party product is available for session auditing and specific session audits are currently defined but session auditing is not enabled, this is a finding.
Fix: F-6787r291250_fix
Deploy a DBMS capable of session auditing. Configure the DBMS software or third-party product to enable session auditing.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000130
- Version
- SRG-APP-000095-DB-000039
- Vuln IDs
-
- V-206528
- V-32368
- Rule IDs
-
- SV-206528r960891_rule
- SV-42705
Checks: C-6788r291252_chk
Check DBMS settings and existing audit records to verify information specific to the audit event type is being captured and stored with the audit records. If audit records exist without information regarding what type of event occurred, this is a finding.
Fix: F-6788r291253_fix
Configure DBMS audit settings to include event type as part of the audit record.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000131
- Version
- SRG-APP-000096-DB-000040
- Vuln IDs
-
- V-206529
- V-32369
- Rule IDs
-
- SV-206529r960894_rule
- SV-42706
Checks: C-6789r291255_chk
Check DBMS settings and existing audit records to verify information specific to the date and time of the event is being captured and stored with the audit records. If audit records exist without the date and time of the event, this is a finding.
Fix: F-6789r291256_fix
Configure DBMS audit settings to include the date and time of the occurrence of the event as part of the audit record.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-APP-000097-DB-000041
- Vuln IDs
-
- V-206530
- V-32370
- Rule IDs
-
- SV-206530r960897_rule
- SV-42707
Checks: C-6790r291258_chk
Check DBMS settings and existing audit records to verify information specific to where the event occurred is being captured and stored with the audit records. If audit records exist without information regarding where the event occurred, this is a finding.
Fix: F-6790r291259_fix
Configure DBMS audit settings to include where the event occurred as part of the audit record.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000133
- Version
- SRG-APP-000098-DB-000042
- Vuln IDs
-
- V-206531
- V-32371
- Rule IDs
-
- SV-206531r960900_rule
- SV-42708
Checks: C-6791r291261_chk
Check DBMS settings and existing audit records to verify information specific to the source (origin) of the event is being captured and stored with audit records. If audit records exist without information regarding the source of the event, this is a finding.
Fix: F-6791r291262_fix
Configure DBMS audit settings to include the source of the event as part of the audit record.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-APP-000099-DB-000043
- Vuln IDs
-
- V-206532
- V-32373
- Rule IDs
-
- SV-206532r960903_rule
- SV-42710
Checks: C-6792r291264_chk
Check DBMS settings and existing audit records to verify information specific to the outcome of the event is being captured and stored with the audit records. If audit records exist without the outcome of the event that occurred, this is a finding.
Fix: F-6792r291265_fix
Configure DBMS audit settings to include the outcome of the event as part of the audit record.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-APP-000100-DB-000201
- Vuln IDs
-
- V-206533
- V-32374
- Rule IDs
-
- SV-206533r960906_rule
- SV-42711
Checks: C-6793r291267_chk
Check DBMS settings and existing audit records to verify a user name associated with the event is being captured and stored with the audit records. If audit records exist without specific user information, this is a finding.
Fix: F-6793r291268_fix
Configure DBMS audit settings to include user name as part of the audit record.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000135
- Version
- SRG-APP-000101-DB-000044
- Vuln IDs
-
- V-206534
- V-32375
- Rule IDs
-
- SV-206534r960909_rule
- SV-42712
Checks: C-6794r291270_chk
Review the system documentation to identify what additional information the organization has determined to be necessary. Check DBMS settings and existing audit records to verify that all organization-defined additional, more detailed information is in the audit records for audit events identified by type, location, or subject. If any additional information is defined and is not contained in the audit records, this is a finding.
Fix: F-6794r291271_fix
Configure DBMS audit settings to include all organization-defined detailed information in the audit records for audit events identified by type, location, or subject.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-APP-000109-DB-000049
- Vuln IDs
-
- V-206535
- V-32383
- Rule IDs
-
- SV-206535r960915_rule
- SV-42720
Checks: C-6795r291273_chk
If the application owner has determined that the need for system availability outweighs the need for a complete audit trail, this is not applicable (NA). Review DBMS, OS, or third-party logging application settings and/or documentation to determine whether the system is capable of shutting down, rolling back all in-flight transactions, in the case of an auditing failure. If it is not, this is a finding. If the system is capable of shutting down upon audit failure but is not configured to do so, this is a finding.
Fix: F-6795r291274_fix
Configure the system to shut down, rolling back all in-flight transactions, in the case of an auditing failure.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- SRG-APP-000109-DB-000321
- Vuln IDs
-
- V-206536
- V-58061
- Rule IDs
-
- SV-206536r960915_rule
- SV-72491
Checks: C-6796r291276_chk
If the application owner has determined that the need for system availability does not outweigh the need for a complete audit trail, this is not applicable (NA). Review DBMS, OS, or third-party logging application settings and/or documentation to determine whether the system is capable of continuing to generate audit records, overwriting the oldest existing records, in the case of an auditing failure. If it is not, this is a finding. If the system is capable of continuing to generate audit records upon audit failure but is not configured to do so, this is a finding.
Fix: F-6796r291277_fix
Deploy a DBMS capable of continuing to generate audit records upon audit failure. Configure the system to continue to generate audit records, overwriting the oldest existing records, in the case of an auditing failure.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- SRG-APP-000116-DB-000057
- Vuln IDs
-
- V-206537
- V-32391
- Rule IDs
-
- SV-206537r960927_rule
- SV-42728
Checks: C-6797r291279_chk
Using product documentation, verify that the DBMS uses current time stamp values obtained from or synchronized with the internal system clock used by the operating system. If it is not able to, this is a finding. If it is able to but is configured so that it does not do so, this is a finding.
Fix: F-6797r291280_fix
Deploy a DBMS that can use time stamp values obtained from or synchronized with the internal system clock used by the operating system. Configure the DBMS to use time stamp values obtained from or synchronized with the internal system clock used by the operating system.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SRG-APP-000118-DB-000059
- Vuln IDs
-
- V-206538
- V-32393
- Rule IDs
-
- SV-206538r960930_rule
- SV-42730
Checks: C-6798r291282_chk
Review locations of audit logs, both internal to the database and database audit logs located at the operating system level. Verify there are appropriate controls and permissions to protect the audit information from unauthorized access. If appropriate controls and permissions do not exist, this is a finding.
Fix: F-6798r291283_fix
Apply controls and modify permissions to protect database audit log data from unauthorized access, whether stored in the database itself or at the OS level.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-APP-000119-DB-000060
- Vuln IDs
-
- V-206539
- V-32394
- Rule IDs
-
- SV-206539r960933_rule
- SV-42731
Checks: C-6799r291285_chk
Review locations of audit logs, both internal to the database and database audit logs located at the operating system level. Verify there are appropriate controls and permissions to protect the audit information from unauthorized modification. If appropriate controls and permissions do not exist, this is a finding.
Fix: F-6799r291286_fix
Apply controls and modify permissions to protect database audit log data from unauthorized modification, whether stored in the database itself or at the OS level.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-APP-000120-DB-000061
- Vuln IDs
-
- V-206540
- V-32395
- Rule IDs
-
- SV-206540r960936_rule
- SV-42732
Checks: C-6800r291288_chk
Review locations of audit logs, both internal to the database, and database audit logs located at the operating system level. Verify there are appropriate controls and permissions to protect the audit information from unauthorized deletion. If appropriate controls and permissions do not exist, this is a finding.
Fix: F-6800r291289_fix
Apply controls and modify permissions to protect database audit log data from unauthorized deletion, whether stored in the database itself or at the OS level.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- SRG-APP-000121-DB-000202
- Vuln IDs
-
- V-206541
- V-32397
- Rule IDs
-
- SV-206541r960939_rule
- SV-42734
Checks: C-6801r291291_chk
Review the access permissions to tools used to view or modify audit log data. These tools may include features within the DBMS itself or software external to the database. If appropriate permissions and access controls to prevent unauthorized access are not applied to these tools, this is a finding.
Fix: F-6801r291292_fix
Apply or modify access controls and permissions (both within the DBMS and in the file system/operating system) to tools used to view or modify audit log data. Tools must be accessible by authorized personnel only.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001494
- Version
- SRG-APP-000122-DB-000203
- Vuln IDs
-
- V-206542
- V-32398
- Rule IDs
-
- SV-206542r960942_rule
- SV-42735
Checks: C-6802r291294_chk
Review the access permissions to tools used to view or modify audit log data. These tools may include features within the DBMS itself or software external to the database. If appropriate permissions and access controls to prevent unauthorized configuration are not applied to these tools, this is a finding.
Fix: F-6802r291295_fix
Apply or modify access controls and permissions (both within the DBMS and in the file system/operating system) to tools used to view or modify audit log data. Tools must be configurable by authorized personnel only.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001495
- Version
- SRG-APP-000123-DB-000204
- Vuln IDs
-
- V-206543
- V-32399
- Rule IDs
-
- SV-206543r960945_rule
- SV-42736
Checks: C-6803r291297_chk
Review the access permissions to tools used to view or modify audit log data. These tools may include features within the DBMS itself or software external to the database. If appropriate permissions and access controls to prevent unauthorized removal are not applied to these tools, this is a finding.
Fix: F-6803r291298_fix
Apply or modify access controls and permissions (both within the DBMS and in the file system/operating system) to tools used to view or modify audit log data. Ensure that tools may be removed by authorized personnel only.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-DB-000179
- Vuln IDs
-
- V-206544
- V-32415
- Rule IDs
-
- SV-206544r960960_rule
- SV-42752
Checks: C-6804r291300_chk
Review monitoring procedures and implementation evidence to verify monitoring of changes to database software libraries, related applications, and configuration files is done. Verify the list of files, directories, and database application objects (procedures, functions, and triggers) being monitored is complete. If monitoring does not occur or is not complete, this is a finding.
Fix: F-6804r291301_fix
Implement procedures to monitor for unauthorized changes to DBMS software libraries, related software application libraries, and configuration files. If a third-party automated tool is not employed, an automated job that reports file information on the directories and files of interest and compares them to the baseline report for the same will meet the requirement. Use file hashes or checksums for comparisons, as file dates may be manipulated by malicious users.
- RMF Control
- CM-5
- Severity
- H
- CCI
- CCI-001499
- Version
- SRG-APP-000133-DB-000198
- Vuln IDs
-
- V-206545
- V-32414
- Rule IDs
-
- SV-206545r960960_rule
- SV-42751
Checks: C-6805r291303_chk
Review procedures for controlling, granting access to, and tracking use of the DBMS software installation account. If access or use of this account is not restricted to the minimum number of personnel required or if unauthorized access to the account has been granted, this is a finding.
Fix: F-6805r291304_fix
Develop, document, and implement procedures to restrict and track use of the DBMS software installation account.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-DB-000199
- Vuln IDs
-
- V-206546
- V-32413
- Rule IDs
-
- SV-206546r960960_rule
- SV-42750
Checks: C-6806r291306_chk
Review the DBMS software library directory and note other root directories located on the same disk directory or any subdirectories. If any non-DBMS software directories exist on the disk directory, examine or investigate their use. If any of the directories are used by other applications, including third-party applications that use the DBMS, this is a finding. Only applications that are required for the functioning and administration, not use, of the DBMS should be located in the same disk directory as the DBMS software libraries. If other applications are located in the same directory as the DBMS, this is a finding. For databases located on mainframes, confirm that the database and its configuration files are isolated in their own DASD pools. If database software and database configuration files share DASD with other applications, this is a finding.
Fix: F-6806r291307_fix
Install all applications on directories separate from the DBMS software library directory. Relocate any directories or reinstall other application software that currently shares the DBMS software library directory. For mainframe-based databases, locate database software and configuration files in separate DASD pools from other mainframe applications.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-DB-000200
- Vuln IDs
-
- V-206547
- V-32412
- Rule IDs
-
- SV-206547r960960_rule
- SV-42749
Checks: C-6807r291309_chk
Review system documentation to identify accounts authorized to own database objects. Review accounts that own objects in the database(s). If any database objects are found to be owned by users not authorized to own database objects, this is a finding.
Fix: F-6807r291310_fix
Assign ownership of authorized objects to authorized object owner accounts.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- SRG-APP-000133-DB-000362
- Vuln IDs
-
- V-206548
- V-58129
- Rule IDs
-
- SV-206548r960960_rule
- SV-72559
Checks: C-6808r291312_chk
Identify the group(s)/role(s) established for DBMS modification. Obtain the list of users in those group(s)/roles. Identify the individuals authorized to modify the DBMS. If unauthorized access to the group(s)/role(s) has been granted, this is a finding.
Fix: F-6808r291313_fix
Revoke unauthorized memberships in the DBMS modification group(s)/role(s).
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-DB-000090
- Vuln IDs
-
- V-206549
- V-32423
- Rule IDs
-
- SV-206549r960963_rule
- SV-42760
Checks: C-6809r291315_chk
Review vendor documentation and vendor websites to identify vendor-provided demonstration or sample databases, database applications, objects, and files. Review the DBMS to determine if any of the demonstration and sample databases, database applications, or files are installed in the database or are included with the DBMS application. If any are present in the database or are included with the DBMS application, this is a finding.
Fix: F-6809r291316_fix
Remove any demonstration and sample databases, database applications, objects, and files from the DBMS.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-DB-000091
- Vuln IDs
-
- V-206550
- V-32424
- Rule IDs
-
- SV-206550r960963_rule
- SV-42761
Checks: C-6810r291318_chk
Review the list of components and features installed with the database. Use the DBMS product installation tool if supported and review the product installation documentation. If unused components or features are installed and are not documented and authorized, this is a finding.
Fix: F-6810r291319_fix
Uninstall unused components or features that are installed and can be uninstalled. Remove any database objects and applications that are installed to support them.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-DB-000092
- Vuln IDs
-
- V-206551
- V-32426
- Rule IDs
-
- SV-206551r960963_rule
- SV-42763
Checks: C-6811r291321_chk
Review the DBMS for unused components of the system that cannot be uninstalled. If unused components or features are present on the system, can be disabled, and are not disabled, this is a finding.
Fix: F-6811r291322_fix
Disable any unused components or features that cannot be uninstalled.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SRG-APP-000141-DB-000093
- Vuln IDs
-
- V-206552
- V-32427
- Rule IDs
-
- SV-206552r960963_rule
- SV-42764
Checks: C-6812r291324_chk
Review the database for definitions of application executable objects stored external to the database. Determine if there are methods to disable use or access, or to remove definitions for external executable objects. Verify each application executable object listed is authorized by the ISSO. If any are not, this is a finding.
Fix: F-6812r291325_fix
Disable use of or remove any external application executable object definitions that are not authorized.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-APP-000142-DB-000094
- Vuln IDs
-
- V-206553
- V-32428
- Rule IDs
-
- SV-206553r960966_rule
- SV-42765
Checks: C-6813r291327_chk
Review the DBMS settings and local documentation for functions, ports, protocols, and services that are not approved. If any are found, this is a finding.
Fix: F-6813r291328_fix
Disable functions, ports, protocols, and services that are not approved.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-APP-000148-DB-000103
- Vuln IDs
-
- V-206554
- V-32442
- Rule IDs
-
- SV-206554r960969_rule
- SV-42779
Checks: C-6814r291330_chk
Review DBMS settings to determine whether organizational users are uniquely identified and authenticated when logging on/connecting to the system. If organizational users are not uniquely identified and authenticated, this is a finding.
Fix: F-6814r291331_fix
Configure DBMS settings to uniquely identify and authenticate all organizational users who log on/connect to the system.
- RMF Control
- Severity
- H
- CCI
- CCI-004066
- Version
- SRG-APP-000164-DB-000401
- Vuln IDs
-
- V-206555
- V-61407
- Rule IDs
-
- SV-206555r981946_rule
- SV-75897
Checks: C-6815r981944_chk
If DBMS authentication, using passwords, is not employed, this is not a finding. If the DBMS is configured to inherit password complexity and lifetime rules from the operating system or access control program, this is not a finding. Review the DBMS settings relating to password complexity. Determine whether the following rules are enforced. If any are not, this is a finding. a. minimum of 15 characters, including at least one of each of the following character sets: - Uppercase. - Lowercase. - Numerics. - Special characters (e.g., ~ ! @ # $ % ^ & * ( ) _ + = - ' [ ] / ? > <). b. Minimum number of characters changed from previous password: 50 percent of the minimum password length; that is, eight. Review the DBMS settings relating to password lifetime. Determine whether the following rules are enforced. If any are not, this is a finding. a. Password lifetime limits for interactive accounts: Minimum 24 hours, maximum 60 days. b. Password lifetime limits for noninteractive accounts: Minimum 24 hours, maximum 365 days. c. Number of password changes before an old one may be reused: Minimum of five.
Fix: F-6815r981945_fix
If the use of passwords is not needed, configure the DBMS to prevent their use if it is capable of this; if it is not, institute policies and procedures to prohibit their use. If the DBMS can inherit password complexity rules from the operating system or access control program, configure it to do so. Otherwise, use DBMS configuration parameters and/or custom code to enforce the following rules for passwords: a. Minimum of 15 characters, including at least one of each of the following character sets: - Uppercase. - Lowercase. - Numerics. - Special characters (e.g., ~ ! @ # $ % ^ & * ( ) _ + = - ' [ ] / ? > <). b. Minimum number of characters changed from previous password: 50 percent of the minimum password length; that is, eight. c. Password lifetime limits for interactive accounts: Minimum 24 hours, maximum 60 days. d. Password lifetime limits for non-interactive accounts: Minimum 24 hours, maximum 365 days. e. Number of password changes before an old one may be reused: Minimum of five.
- RMF Control
- Severity
- H
- CCI
- CCI-004062
- Version
- SRG-APP-000171-DB-000074
- Vuln IDs
-
- V-206556
- V-32468
- Rule IDs
-
- SV-206556r981949_rule
- SV-42805
Checks: C-6816r981947_chk
Review the list of DBMS database objects, database configuration files, associated scripts, and applications defined within and external to the DBMS that access the database. The list should also include files or settings used to configure the operational environment for the DBMS and for interactive DBMS user accounts. Determine whether any DBMS database objects, database configuration files, associated scripts, applications defined within or external to the DBMS that access the database, and DBMS/user environment files/settings contain database passwords. If any do, confirm that DBMS passwords stored internally or externally to the DBMS are hashed using FIPS-approved cryptographic algorithms and include a salt. If any passwords are stored in clear text, this is a finding. If any passwords are stored with reversible encryption, this is a finding. If any passwords are stored using unsalted hashes, this is a finding.
Fix: F-6816r981948_fix
Develop, document, and maintain a list of DBMS database objects, database configuration files, associated scripts, applications defined within or external to the DBMS that access the database, and DBMS/user environment files/settings in the System Security Plan. Record whether they do or do not contain DBMS passwords. If passwords are present, ensure they are correctly hashed using one-way, salted hashing functions, and that the hashes are protected by host system security.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- SRG-APP-000172-DB-000075
- Vuln IDs
-
- V-206557
- V-32469
- Rule IDs
-
- SV-206557r961029_rule
- SV-42806
Checks: C-6817r291339_chk
Review configuration settings for encrypting passwords in transit across the network. If passwords are not encrypted, this is a finding. If it is determined that passwords are passed unencrypted at any point along the transmission path between the source and destination, this is a finding.
Fix: F-6817r291340_fix
Configure encryption for transmission of passwords across the network. If the database does not provide encryption for logon events natively, employ encryption at the OS or network level. Ensure passwords remain encrypted from source to destination.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-APP-000175-DB-000067
- Vuln IDs
-
- V-206558
- V-32475
- Rule IDs
-
- SV-206558r961038_rule
- SV-42812
Checks: C-6818r291342_chk
Review DBMS configuration to verify that certificates being accepted by the DBMS are validated by performing RFC 5280-compliant certification path validation. If certificates are not being validated by performing RFC 5280-compliant certification path validation, this is a finding.
Fix: F-6818r291343_fix
Configure the DBMS to validate certificates by performing RFC 5280-compliant certification path validation.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000186
- Version
- SRG-APP-000176-DB-000068
- Vuln IDs
-
- V-206559
- V-32476
- Rule IDs
-
- SV-206559r961041_rule
- SV-42813
Checks: C-6819r836855_chk
Review DBMS configuration to determine whether appropriate access controls exist to protect the DBMS's private key(s). If the DMBS’s private key(s) are not stored in a FIPS 140-2 or 140-3 validated cryptographic module, this is a finding. If access to the DBMS’s private key(s) is not restricted to authenticated and authorized users, this is a finding.
Fix: F-6819r836856_fix
Store all DBMS PKI private keys in a FIPS 140-2 or 140-3 validated cryptographic module. Ensure access to the DBMS PKI private keys is restricted to only authenticated and authorized users.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- SRG-APP-000177-DB-000069
- Vuln IDs
-
- V-206560
- V-32478
- Rule IDs
-
- SV-206560r961044_rule
- SV-42815
Checks: C-6820r291348_chk
Review DBMS configuration to verify DBMS user accounts are being mapped directly to unique identifying information within the validated PKI certificate. If user accounts are not being mapped to authenticated identities, this is a finding.
Fix: F-6820r291349_fix
Configure the DBMS to map the authenticated identity directly to the DBMS user account.
- RMF Control
- IA-6
- Severity
- H
- CCI
- CCI-000206
- Version
- SRG-APP-000178-DB-000083
- Vuln IDs
-
- V-206561
- V-32479
- Rule IDs
-
- SV-206561r961047_rule
- SV-42816
Checks: C-6821r291351_chk
If all interaction with the user for purposes of authentication is handled by a software component separate from the DBMS, this is not a finding. If any application, tool or feature associated with the DBMS/database displays any authentication secrets (to include PINs and passwords) during - or after - the authentication process, this is a finding.
Fix: F-6821r291352_fix
Modify and configure each non-compliant application, tool, or feature associated with the DBMS/database so that it does not display authentication secrets.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SRG-APP-000179-DB-000114
- Vuln IDs
-
- V-206562
- V-32480
- Rule IDs
-
- SV-206562r961050_rule
- SV-42817
Checks: C-6822r836858_chk
Review DBMS configuration to verify it is using NIST FIPS 140-2 or 140-3 validated cryptographic modules for cryptographic operations. If NIST FIPS 140-2 or 140-3 validated modules are not being used for all cryptographic operations, this is a finding.
Fix: F-6822r836859_fix
Utilize NIST FIPS 140-2 or 140-3 validated cryptographic modules for all cryptographic operations.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- SRG-APP-000180-DB-000115
- Vuln IDs
-
- V-206563
- V-32481
- Rule IDs
-
- SV-206563r961053_rule
- SV-42818
Checks: C-6823r291357_chk
Review DBMS settings to determine whether non-organizational users are uniquely identified and authenticated when logging onto the system. If non-organizational users are not uniquely identified and authenticated, this is a finding.
Fix: F-6823r291358_fix
Configure DBMS settings to uniquely identify and authenticate all non-organizational users who log onto the system.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- SRG-APP-000211-DB-000122
- Vuln IDs
-
- V-206564
- V-32514
- Rule IDs
-
- SV-206564r961095_rule
- SV-42851
Checks: C-6824r291360_chk
Check DBMS settings and vendor documentation to verify that administrative functionality is separate from user functionality. If administrator and general user functionality are not separated either physically or logically, this is a finding.
Fix: F-6824r291361_fix
Configure DBMS to separate database administration and general user functionality.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001185
- Version
- SRG-APP-000220-DB-000149
- Vuln IDs
-
- V-206565
- V-32523
- Rule IDs
-
- SV-206565r961113_rule
- SV-42860
Checks: C-6825r291363_chk
Review DBMS settings and vendor documentation to verify user sessions are terminated, and session identifiers invalidated, upon user logout. If they are not, this is a finding. Review system documentation and organization policy to identify other events that should result in session terminations. If other session termination events are defined, review DBMS settings to verify occurrences of these events would cause session termination, invalidating the session identifiers. If occurrences of defined session terminating events do not cause session terminations, invalidating the session identifiers, this is a finding.
Fix: F-6825r291364_fix
Configure DBMS settings to terminate sessions, invalidating their session identifiers, upon user logout. Configure DBMS settings to terminate sessions, invalidating their session identifiers, upon the occurrence of any organization- or policy-defined session termination event.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- SRG-APP-000223-DB-000168
- Vuln IDs
-
- V-206566
- V-32526
- Rule IDs
-
- SV-206566r961116_rule
- SV-42863
Checks: C-6826r291366_chk
Review DBMS settings and vendor documentation to determine whether the DBMS recognizes session identifiers that are not system-generated. If the DBMS recognizes session identifiers that are not system generated, this is a finding.
Fix: F-6826r291367_fix
Utilize a DBMS product that only recognizes session identifiers that are system-generated.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-APP-000224-DB-000384
- Vuln IDs
-
- V-206567
- V-58165
- Rule IDs
-
- SV-206567r961119_rule
- SV-72595
Checks: C-6827r291369_chk
Review DBMS vendor documentation and system behavior (and if necessary, consult vendor representatives) to determine whether the DBMS can provide demonstrably effective protection against man-in-the-middle attacks that guess at session identifier values. If not, this is a finding. Review DBMS settings to determine whether protections against man-in-the-middle attacks that guess at session identifier values are enabled. If they are not, this is a finding.
Fix: F-6827r291370_fix
Utilize a DBMS product that can provide demonstrably effective protection against man-in-the-middle attacks that guess at session identifier values. Configure DBMS settings to enable protections against man-in-the-middle attacks that guess at session identifier values.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-APP-000225-DB-000153
- Vuln IDs
-
- V-206568
- V-32528
- Rule IDs
-
- SV-206568r961122_rule
- SV-42865
Checks: C-6828r291372_chk
Check DBMS settings and vendor documentation to verify the DBMS properly handles transactions in the event of a system failure. If open transactions are not rolled back to a consistent state during system failure, this is a finding. The consistent state must include a security configuration that is at least as restrictive as before the system failure. If this is not guaranteed, this is a finding.
Fix: F-6828r291373_fix
Configure DBMS settings so that, in the event of a system failure, the DBMS will roll back open transactions to a consistent state, to include a security configuration that is at least as restrictive as before the system failure.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- SRG-APP-000226-DB-000147
- Vuln IDs
-
- V-206569
- V-32529
- Rule IDs
-
- SV-206569r961125_rule
- SV-42866
Checks: C-6829r291375_chk
Check DBMS settings to determine whether organization-defined system state information is being preserved in the event of a system failure. If organization-defined system state information is not being preserved, this is a finding.
Fix: F-6829r291376_fix
Configure DBMS settings to preserve any organization-defined system state information in the event of a system failure.
- RMF Control
- SC-28
- Severity
- H
- CCI
- CCI-001199
- Version
- SRG-APP-000231-DB-000154
- Vuln IDs
-
- V-206570
- V-32534
- Rule IDs
-
- SV-206570r961128_rule
- SV-42871
Checks: C-6830r291378_chk
If the application owner and Authorizing Official have determined that encryption of data at rest is NOT required, this is not a finding. Review DBMS settings to determine whether controls exist to protect the confidentiality and integrity of data at rest in the database. If controls do not exist or are not enabled, this is a finding.
Fix: F-6830r291379_fix
Apply appropriate controls to protect the confidentiality and integrity of data at rest in the database.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- SRG-APP-000233-DB-000124
- Vuln IDs
-
- V-206571
- V-32536
- Rule IDs
-
- SV-206571r961131_rule
- SV-42873
Checks: C-6831r291381_chk
Check DBMS settings to determine whether objects or code implementing security functionality are located in a separate security domain, such as a separate database or schema created specifically for security functionality. If security-related database objects or code are not kept separate, this is a finding.
Fix: F-6831r291382_fix
Locate security-related database objects and code in a separate database, schema, or other separate security domain from database objects and code implementing application logic.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- SRG-APP-000243-DB-000128
- Vuln IDs
-
- V-206572
- V-32547
- Rule IDs
-
- SV-206572r961149_rule
- SV-42884
Checks: C-6832r291384_chk
Review the procedures for the refreshing of development/test data from production. Review any scripts or code that exists for the movement of production data to development/test systems, or to any other location or for any other purpose. Verify that copies of production data are not left in unprotected locations. If the code that exists for data movement does not comply with the organization-defined data transfer policy and/or fails to remove any copies of production data from unprotected locations, this is a finding.
Fix: F-6832r291385_fix
Modify any code used for moving data from production to development/test systems to comply with the organization-defined data transfer policy, and to ensure copies of production data are not left in unsecured locations.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- SRG-APP-000243-DB-000373
- Vuln IDs
-
- V-206573
- V-58149
- Rule IDs
-
- SV-206573r961149_rule
- SV-72579
Checks: C-6833r291387_chk
Review the DBMS architecture to find out if and how it protects the private resources of one process or user (such as working memory, temporary tables, uncommitted data) from unauthorized access by another user or process. If it does not effectively do so, this is a finding.
Fix: F-6833r291388_fix
Deploy a DBMS capable of effectively protecting the private resources of one process or user from unauthorized access by another user or process. Configure the DBMS to effectively protect the private resources of one process or user from unauthorized access by another user or process.
- RMF Control
- SC-4
- Severity
- M
- CCI
- CCI-001090
- Version
- SRG-APP-000243-DB-000374
- Vuln IDs
-
- V-206574
- V-58151
- Rule IDs
-
- SV-206574r961149_rule
- SV-72581
Checks: C-6834r291390_chk
Review the permissions granted to users by the operating system/file system on the database files, database log files and database backup files. If any user/role who is not an authorized system administrator with a need to know or database administrator with a need to know, or a system account for running DBMS processes, is permitted to read/view any of these files, this is a finding.
Fix: F-6834r291391_fix
Configure the permissions granted by the operating system/file system on the database files, database log files, and database backup files so that only relevant system accounts and authorized system administrators and database administrators with a need to know are permitted to read/view these files.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-APP-000251-DB-000160
- Vuln IDs
-
- V-206575
- V-32555
- Rule IDs
-
- SV-206575r961158_rule
- SV-42892
Checks: C-6835r291393_chk
Review DBMS code (stored procedures, functions, and triggers), application code, settings, column and field definitions, and constraints to determine whether the database is protected against invalid input. If code exists that allows invalid data to be acted upon or input into the database, this is a finding. If column/field definitions do not exist in the database, this is a finding. If columns/fields do not contain constraints and validity checking where required, this is a finding. Where a column/field is noted in the system documentation as necessarily free-form, even though its name and context suggest that it should be strongly typed and constrained, the absence of these protections is not a finding. Where a column/field is clearly identified by name, caption or context as Notes, Comments, Description, Text, etc., the absence of these protections is not a finding.
Fix: F-6835r291394_fix
Modify database code to properly validate data before it is put into the database or acted upon by the database. Modify the database to contain column/field definitions for each column/field in the database. Modify the database to contain constraints and validity checking on database columns and tables that require them for data integrity.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-APP-000251-DB-000391
- Vuln IDs
-
- V-206576
- V-58179
- Rule IDs
-
- SV-206576r961158_rule
- SV-72609
Checks: C-6836r291396_chk
Review DBMS source code (stored procedures, functions, triggers) and application source code, to identify cases of dynamic code execution. If dynamic code execution is employed in circumstances where the objective could practically be satisfied by static execution with strongly typed parameters, this is a finding.
Fix: F-6836r291397_fix
Where dynamic code execution is employed in circumstances where the objective could practically be satisfied by static execution with strongly typed parameters, modify the code to do so.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-001310
- Version
- SRG-APP-000251-DB-000392
- Vuln IDs
-
- V-206577
- V-58181
- Rule IDs
-
- SV-206577r961158_rule
- SV-72611
Checks: C-6837r291399_chk
Review DBMS source code (stored procedures, functions, triggers) and application source code to identify cases of dynamic code execution. If dynamic code execution is employed without protective measures against code injection, this is a finding.
Fix: F-6837r291400_fix
Where dynamic code execution is used, modify the code to implement protections against code injection.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001312
- Version
- SRG-APP-000266-DB-000162
- Vuln IDs
-
- V-206578
- V-32570
- Rule IDs
-
- SV-206578r961167_rule
- SV-42907
Checks: C-6838r291402_chk
Check DBMS settings and custom database code to verify that error messages do not contain information beyond what is needed for troubleshooting the issue. If database errors contain PII data, sensitive business data, or information useful for identifying the host system or database structure, this is a finding.
Fix: F-6838r291403_fix
Configure DBMS settings, custom database code, and associated application code not to divulge sensitive information or information useful for system identification in error messages.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- SRG-APP-000267-DB-000163
- Vuln IDs
-
- V-206579
- V-32571
- Rule IDs
-
- SV-206579r961170_rule
- SV-42908
Checks: C-6839r291405_chk
Check DBMS settings and custom database code to determine if detailed error messages are ever displayed to unauthorized individuals. If detailed error messages are displayed to individuals not authorized to view them, this is a finding.
Fix: F-6839r291406_fix
Configure DBMS settings, custom database code, and associated application code not to display detailed error messages to those not authorized to view them.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SRG-APP-000295-DB-000305
- Vuln IDs
-
- V-206580
- V-58025
- Rule IDs
-
- SV-206580r961221_rule
- SV-72455
Checks: C-6840r291408_chk
Review system documentation to obtain the organization's definition of circumstances requiring automatic session termination. If the documentation explicitly states that such termination is not required or is prohibited, this is not a finding. If the documentation requires automatic session termination, but the DBMS is not configured accordingly, this is a finding.
Fix: F-6840r291409_fix
Configure the DBMS to automatically terminate a user session after organization-defined conditions or trigger events requiring session termination.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002363
- Version
- SRG-APP-000296-DB-000306
- Vuln IDs
-
- V-206581
- V-58035
- Rule IDs
-
- SV-206581r961224_rule
- SV-72465
Checks: C-6841r291411_chk
Determine, by reviewing DBMS documentation and/or inquiring of the vendor's technical support staff, whether the DBMS satisfies this requirement; and, if it does, determine whether this is inherent, unchangeable behavior, or a configurable feature. If the DBMS does not satisfy the requirement, this is a permanent finding. If the behavior is inherent, this is permanently not a finding. If the behavior is configurable, and the current configuration does not enforce it, this is a finding.
Fix: F-6841r291412_fix
Where relevant, modify the configuration to allow the user to manually terminate a session initiated by that user.
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002262
- Version
- SRG-APP-000311-DB-000308
- Vuln IDs
-
- V-206582
- V-58037
- Rule IDs
-
- SV-206582r961269_rule
- SV-72467
Checks: C-6842r291414_chk
If security labeling is not required, this is not a finding. If security labeling requirements have been specified, but the security labeling is not implemented or does not reliably maintain labels on information in storage, this is a finding.
Fix: F-6842r291415_fix
Enable DBMS features, deploy third-party software, or add custom data structures, data elements and application code, to provide reliable security labeling of information in storage.
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002263
- Version
- SRG-APP-000313-DB-000309
- Vuln IDs
-
- V-206583
- V-58039
- Rule IDs
-
- SV-206583r961272_rule
- SV-72469
Checks: C-6843r291417_chk
If security labeling is not required, this is not a finding. If security labeling requirements have been specified, but the security labeling is not implemented or does not reliably maintain labels on information in process, this is a finding.
Fix: F-6843r291418_fix
Enable DBMS features, deploy third-party software, or add custom data structures, data elements and application code, to provide reliable security labeling of information in process.
- RMF Control
- AC-16
- Severity
- M
- CCI
- CCI-002264
- Version
- SRG-APP-000314-DB-000310
- Vuln IDs
-
- V-206584
- V-58041
- Rule IDs
-
- SV-206584r961275_rule
- SV-72471
Checks: C-6844r291420_chk
If security labeling is not required, this is not a finding. If security labeling requirements have been specified, but the security labeling is not implemented or does not reliably maintain labels on information in transmission, this is a finding.
Fix: F-6844r291421_fix
Enable DBMS features, deploy third-party software, or add custom data structures, data elements and application code, to provide reliable security labeling of information in transmission.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- SRG-APP-000328-DB-000301
- Vuln IDs
-
- V-206585
- V-58019
- Rule IDs
-
- SV-206585r961317_rule
- SV-72449
Checks: C-6845r291423_chk
Review system documentation to identify the required discretionary access control (DAC). Review the security configuration of the database and DBMS. If applicable, review the security configuration of the application(s) using the database. If the discretionary access control defined in the documentation is not implemented in the security configuration, this is a finding.
Fix: F-6845r291424_fix
Implement the organization's DAC policy in the security configuration of the database and DBMS, and, if applicable, the security configuration of the application(s) using the database.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- SRG-APP-000340-DB-000304
- Vuln IDs
-
- V-206586
- V-58023
- Rule IDs
-
- SV-206586r961353_rule
- SV-72453
Checks: C-6846r291426_chk
Review the system documentation to obtain the definition of the database/DBMS functionality considered privileged in the context of the system in question. Review the DBMS security configuration and/or other means used to protect privileged functionality from unauthorized use. If the configuration does not protect all of the actions defined as privileged, this is a finding.
Fix: F-6846r291427_fix
Configure DBMS security to protect all privileged functionality.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002233
- Version
- SRG-APP-000342-DB-000302
- Vuln IDs
-
- V-206587
- V-58021
- Rule IDs
-
- SV-206587r961359_rule
- SV-72451
Checks: C-6847r291429_chk
Review the system documentation, database and DBMS security configuration, source code for DBMS internal logic, source code of external modules invoked by the DBMS, and source code of the application(s) using the database. If elevation of DBMS privileges is utilized but not documented, this is a finding. If elevation of DBMS privileges is documented, but not implemented as described in the documentation, this is a finding. If the privilege-elevation logic can be invoked in ways other than intended, or in contexts other than intended, or by subjects/principals other than intended, this is a finding.
Fix: F-6847r291430_fix
Determine where, when, how, and by what principals/subjects elevated privilege is needed. Modify the database and DBMS security configuration, DBMS internal logic, external modules invoked by the DBMS, and the application(s) using the database, to ensure privilege elevation is used only as required.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- SRG-APP-000357-DB-000316
- Vuln IDs
-
- V-206591
- V-58053
- Rule IDs
-
- SV-206591r961392_rule
- SV-72483
Checks: C-6851r291441_chk
Investigate whether there have been any incidents where the DBMS ran out of audit log space since the last time the space was allocated or other corrective measures were taken. If there have been, this is a finding.
Fix: F-6851r291442_fix
Allocate sufficient audit file/table space to support peak demand.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- SRG-APP-000359-DB-000319
- Vuln IDs
-
- V-206592
- V-58057
- Rule IDs
-
- SV-206592r961398_rule
- SV-72487
Checks: C-6852r291444_chk
Review system configuration. If appropriate support staff are not notified immediately upon storage volume utilization reaching 75%, this is a finding.
Fix: F-6852r291445_fix
Configure the system to notify appropriate support staff immediately upon storage volume utilization reaching 75%.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-APP-000360-DB-000320
- Vuln IDs
-
- V-206593
- V-58059
- Rule IDs
-
- SV-206593r961401_rule
- SV-72489
Checks: C-6853r850970_chk
Review DBMS settings, OS, or third-party logging software settings to determine whether a real-time alert will be sent to the appropriate personnel when auditing fails for any reason. If real-time alerts are not sent upon auditing failure, this is a finding.
Fix: F-6853r531242_fix
Configure the system to provide immediate real-time alerts to appropriate support staff when an audit log failure occurs.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- SRG-APP-000374-DB-000322
- Vuln IDs
-
- V-206594
- V-58063
- Rule IDs
-
- SV-206594r961443_rule
- SV-72493
Checks: C-6854r291450_chk
Verify that the DBMS generates time stamps, in audit records and application data, that maps to UTC. If it does not, this is a finding.
Fix: F-6854r291451_fix
Ensure the DBMS generates time stamps, in audit records and application data, that maps to UTC.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- SRG-APP-000375-DB-000323
- Vuln IDs
-
- V-206595
- V-58065
- Rule IDs
-
- SV-206595r961446_rule
- SV-72495
Checks: C-6855r291453_chk
Review product documentation to verify that the DBMS can generate time stamps with a granularity of one second or finer. If it cannot, this is a finding. Review audit log records produced by the DBMS for confirmation that time stamps are recorded to a precision of one second or finer. If not, this is a finding. Review time stamp values in audit trail columns/fields in application data in the database. If the time stamps are not recorded to a precision of one second or finer, this is a finding.
Fix: F-6855r291454_fix
Deploy a DBMS that can generate and record time stamps with a granularity of one second or finer. Configure auditing so that the time stamps are recorded to a precision of one second or finer. Modify applications and/or column/field definitions so that the time stamps in audit trail columns/fields in application data are recorded to a precision of one second or finer.
- RMF Control
- Severity
- M
- CCI
- CCI-003980
- Version
- SRG-APP-000378-DB-000365
- Vuln IDs
-
- V-206596
- V-58135
- Rule IDs
-
- SV-206596r981956_rule
- SV-72565
Checks: C-6856r981954_chk
If the DBMS supports only software development, experimentation and/or developer-level testing (that is, excluding production systems, integration testing, stress testing, and user acceptance testing), this is not a finding. Review the DBMS and database security settings with respect to nonadministrative users' ability to create, alter, or replace logic modules, to include but not necessarily only stored procedures, functions, triggers, and views. If any such permissions exist and are not documented and approved, this is a finding.
Fix: F-6856r981955_fix
Document and obtain approval for any nonadministrative users who require the ability to create, alter or replace logic modules. Implement the approved permissions. Revoke any unapproved permissions.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- SRG-APP-000380-DB-000360
- Vuln IDs
-
- V-206597
- V-58125
- Rule IDs
-
- SV-206597r961461_rule
- SV-72555
Checks: C-6857r291459_chk
Review DBMS vendor documentation with respect to its ability to enforce access restrictions associated with changes to the configuration of the DBMS or database(s). If it is not able to do this, this is a finding. Review the security configuration of the DBMS and database(s). If it does not enforce access restrictions associated with changes to the configuration of the DBMS or database(s), this is a finding.
Fix: F-6857r291460_fix
Deploy a DBMS capable of enforcing access restrictions associated with changes to the configuration of the DBMS or database(s). Configure the DBMS to enforce access restrictions associated with changes to the configuration of the DBMS or database(s).
- RMF Control
- Severity
- M
- CCI
- CCI-003938
- Version
- SRG-APP-000381-DB-000361
- Vuln IDs
-
- V-206598
- V-58127
- Rule IDs
-
- SV-206598r981958_rule
- SV-72557
Checks: C-6858r981957_chk
Review DBMS documentation to verify audit records can be produced when the system denies or fails to complete attempts to change the configuration of the DBMS or database(s). If the DBMS is not capable of this, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to change the configuration of the DBMS or database(s). If they are not produced, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to change the configuration of the DBMS or database(s). If they are not produced, this is a finding.
Fix: F-6858r291463_fix
Deploy a DBMS capable of producing the required audit records when it denies or fails to complete attempts to change the configuration of the DBMS or database(s). Configure the DBMS to produce audit records when it denies attempts to change the configuration of the DBMS or database(s). Configure the DBMS to produce audit records when other errors prevent attempts to change the configuration of the DBMS or database(s).
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- SRG-APP-000383-DB-000364
- Vuln IDs
-
- V-206599
- V-58133
- Rule IDs
-
- SV-206599r961470_rule
- SV-72563
Checks: C-6859r291465_chk
Review the network functions, ports, protocols, and services supported by the DBMS. If any protocol is prohibited by the PPSM guidance and is enabled, this is a finding.
Fix: F-6859r291466_fix
Deploy a DBMS capable of disabling a network function, port, protocol, or service prohibited by the PPSM guidance. Disable each prohibited network function, port, protocol, or service.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002007
- Version
- SRG-APP-000400-DB-000367
- Vuln IDs
-
- V-206601
- V-58137
- Rule IDs
-
- SV-206601r961521_rule
- SV-72567
Checks: C-6861r291471_chk
Review system settings to determine whether the organization-defined limit for cached authentication is implemented. If it is not implemented, this is a finding.
Fix: F-6861r291472_fix
Modify system settings to implement the organization-defined limit on the lifetime of cached authenticators.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- SRG-APP-000427-DB-000385
- Vuln IDs
-
- V-206603
- V-58167
- Rule IDs
-
- SV-206603r961596_rule
- SV-72597
Checks: C-6863r291477_chk
If the DBMS will accept non-DoD approved PKI end-entity certificates, this is a finding.
Fix: F-6863r291478_fix
Revoke trust in any certificates not issued by a DoD-approved certificate authority. Configure the DBMS to accept only DoD and DoD-approved PKI end-entity certificates.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002475
- Version
- SRG-APP-000428-DB-000386
- Vuln IDs
-
- V-206604
- V-58169
- Rule IDs
-
- SV-206604r961599_rule
- SV-72599
Checks: C-6864r291480_chk
Review the system documentation to determine whether the organization has defined the information at rest that is to be protected from modification, which must include, at a minimum, PII and classified information. If no information is identified as requiring such protection, this is not a finding. Review the configuration of the DBMS, operating system/file system, and additional software as relevant. If any of the information defined as requiring cryptographic protection from modification is not encrypted in a manner that provides the required level of protection, this is a finding.
Fix: F-6864r291481_fix
Configure the DBMS, operating system/file system, and additional software as relevant, to provide the required level of cryptographic protection.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- SRG-APP-000429-DB-000387
- Vuln IDs
-
- V-206605
- V-58171
- Rule IDs
-
- SV-206605r961602_rule
- SV-72601
Checks: C-6865r291483_chk
Review the system documentation to determine whether the organization has defined the information at rest that is to be protected from disclosure, which must include, at a minimum, PII and classified information. If the documentation indicates no information requires such protections, this is not a finding. Review the configuration of the DBMS, operating system/file system, and additional software as relevant. If any of the information defined as requiring protection is not encrypted in a manner that provides the required level of protection and is not physically secured to the required level, this is a finding.
Fix: F-6865r291484_fix
Configure the DBMS, operating system/file system, and additional software as relevant, to provide the required level of cryptographic protection for information requiring cryptographic protection against disclosure. Secure the premises, equipment, and media to provide the required level of physical protection.
- RMF Control
- SC-39
- Severity
- M
- CCI
- CCI-002530
- Version
- SRG-APP-000431-DB-000388
- Vuln IDs
-
- V-206606
- V-58173
- Rule IDs
-
- SV-206606r961608_rule
- SV-72603
Checks: C-6866r291486_chk
Review the DBMS architecture to find out if and how it protects the private resources of one process (such as working memory, temporary tables, uncommitted data and, especially, executable code) from unauthorized access or modification by another user or process. If it is not capable of maintaining a separate execution domain for each executing process, this is a finding. If the DBMS is capable of maintaining a separate execution domain for each executing process, but is configured not to do so, this is a finding.
Fix: F-6866r291487_fix
Deploy a DBMS capable of maintaining a separate execution domain for each executing process. If this is a configurable feature, configure the DBMS to implement it.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002420
- Version
- SRG-APP-000441-DB-000378
- Vuln IDs
-
- V-206607
- V-58153
- Rule IDs
-
- SV-206607r961638_rule
- SV-72583
Checks: C-6867r291489_chk
If the data owner does not have a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process, this is not a finding. If the DBMS does not employ protective measures against unauthorized disclosure and modification during preparation for transmission, this is a finding.
Fix: F-6867r291490_fix
Implement protective measures against unauthorized disclosure and modification during preparation for transmission.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- SRG-APP-000442-DB-000379
- Vuln IDs
-
- V-206608
- V-58155
- Rule IDs
-
- SV-206608r961641_rule
- SV-72585
Checks: C-6868r291492_chk
If the data owner does not have a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process, this is not a finding. If the DBMS, associated applications, and infrastructure do not employ protective measures against unauthorized disclosure and modification during reception, this is a finding.
Fix: F-6868r291493_fix
Implement protective measures against unauthorized disclosure and modification during reception.
- RMF Control
- SI-10
- Severity
- M
- CCI
- CCI-002754
- Version
- SRG-APP-000447-DB-000393
- Vuln IDs
-
- V-206609
- V-58183
- Rule IDs
-
- SV-206609r961656_rule
- SV-72613
Checks: C-6869r291495_chk
Review system documentation to determine how input errors are to be handled in general and if any special handling is defined for specific circumstances. Review the source code for database program objects (stored procedures, functions, triggers) and application source code to identify how the system responds to invalid input. If it does not implement the documented behavior, this is a finding.
Fix: F-6869r291496_fix
Revise and deploy the source code for database program objects (stored procedures, functions, triggers) and application source code, to implement the documented behavior.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002617
- Version
- SRG-APP-000454-DB-000389
- Vuln IDs
-
- V-206610
- V-58175
- Rule IDs
-
- SV-206610r961677_rule
- SV-72605
Checks: C-6870r291498_chk
If software components that have been replaced or made unnecessary are not removed, this is a finding.
Fix: F-6870r291499_fix
Identify and remove software components that have been replaced or made unnecessary.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- SRG-APP-000456-DB-000390
- Vuln IDs
-
- V-206611
- V-58177
- Rule IDs
-
- SV-206611r1001008_rule
- SV-72607
Checks: C-6871r291501_chk
Obtain evidence that software patches are consistently applied to the DBMS within the time frame defined for each patch. If such evidence cannot be obtained, or the evidence that is obtained indicates a pattern of noncompliance, this is a finding.
Fix: F-6871r291502_fix
Institute and adhere to policies and procedures to ensure that patches are consistently applied to the DBMS within the time allowed.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000492-DB-000332
- Vuln IDs
-
- V-206612
- V-58083
- Rule IDs
-
- SV-206612r961791_rule
- SV-72513
Checks: C-6872r291504_chk
If the DBMS architecture makes it impossible for any user, even with the highest privileges, to directly view or directly modify the contents of its built-in security objects, and if there are no additional, locally-defined security objects in the database(s), this is not a finding. Review DBMS documentation to verify that audit records can be produced when security objects, such as tables, views, procedures, and functions, are accessed, to include reads, creations, modifications and deletions of data, and execution of logic. If the DBMS is not capable of this, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when security objects, such as tables, views, procedures, and functions, are accessed, to include reads, creations, modifications and deletions of data, and execution of logic. If they are not produced, this is a finding.
Fix: F-6872r291505_fix
Deploy a DBMS capable of producing the required audit records when security objects, such as tables, views, procedures, and functions, are accessed. Configure the DBMS to produce audit records when security objects, such as tables, views, procedures, and functions, are accessed, to include reads, creations, modifications and deletions of data, and execution of logic.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000492-DB-000333
- Vuln IDs
-
- V-206613
- V-58085
- Rule IDs
-
- SV-206613r961791_rule
- SV-72515
Checks: C-6873r291507_chk
If the DBMS architecture makes it impossible for any user, even with the highest privileges, to directly view or directly modify the contents of its built-in security objects, and if there are no additional, locally-defined security objects in the database(s), this is not a finding. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to access security objects, such as tables, views, procedures, and functions, such access to include reads, creations, modifications and deletions of data, and execution of logic. If the DBMS is not capable of this, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to access security objects, such as tables, views, procedures, and functions, such access to include reads, creations, modifications and deletions of data, and execution of logic. If they are not produced, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to access security object. If they are not produced, this is a finding.
Fix: F-6873r291508_fix
Deploy a DBMS capable of producing the required audit records when it denies or fails to complete access to security objects, such as tables, views, procedures, and functions. Configure the DBMS to produce audit records when it denies access to security objects, such as tables, views, procedures, and functions, such access to include reads, creations, modifications and deletions of data, and execution of logic. Configure the DBMS to produce audit records when other errors prevent access to security objects, such as tables, views, procedures, and functions, such access to include reads, creations, modifications and deletions of data, and execution of logic.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000494-DB-000344
- Vuln IDs
-
- V-206614
- V-58095
- Rule IDs
-
- SV-206614r961797_rule
- SV-72525
Checks: C-6874r291510_chk
Review DBMS documentation to verify that audit records can be produced when categories of information are accessed, to include reads, creations, modifications, and deletions. If the DBMS is not capable of this, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when categories of information are accessed, to include reads, creations, modifications, and deletions. If they are not produced, this is a finding.
Fix: F-6874r291511_fix
Deploy a DBMS capable of producing the required audit records when categories of information are accessed. Configure the DBMS to produce audit records when categories of information are accessed, to include reads, creations, modifications, and deletions.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000494-DB-000345
- Vuln IDs
-
- V-206615
- V-58097
- Rule IDs
-
- SV-206615r961797_rule
- SV-72527
Checks: C-6875r291513_chk
Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to access categories of information, such access to include reads, creations, modifications and deletions. If the DBMS is not capable of this, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to access categories of information, such access to include reads, creations, modifications and deletions. If they are not produced, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to access categories of information, such access to include reads, creations, modifications and deletions. If they are not produced, this is a finding.
Fix: F-6875r291514_fix
Deploy a DBMS capable of producing the required audit records when it denies or fails to complete access to categories of information. Configure the DBMS to produce audit records when it denies access to categories of information, such access to include reads, creations, modifications and deletions. Configure the DBMS to produce audit records when other errors prevent access to categories of information, such access to include reads, creations, modifications and deletions.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000495-DB-000326
- Vuln IDs
-
- V-206616
- V-58071
- Rule IDs
-
- SV-206616r961800_rule
- SV-72501
Checks: C-6876r291516_chk
Review DBMS documentation to verify that audit records can be produced when privileges/permissions/role memberships are added. If the DBMS is not capable of this, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when privileges/permissions/role memberships are added. If they are not produced, this is a finding.
Fix: F-6876r291517_fix
Deploy a DBMS capable of producing the required audit records when privileges/permissions/role memberships are added. Configure the DBMS to produce audit records when privileges/permissions/role memberships are added.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000495-DB-000327
- Vuln IDs
-
- V-206617
- V-58073
- Rule IDs
-
- SV-206617r961800_rule
- SV-72503
Checks: C-6877r291519_chk
Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to add privileges/permissions/role membership. If the DBMS is not capable of this, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when the DBMS denies the addition of privileges/permissions/role membership. If they are not produced, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent the addition of privileges/permissions/role membership. If they are not produced, this is a finding.
Fix: F-6877r291520_fix
Deploy a DBMS capable of producing the required audit records when it denies or fails to complete attempts to add privileges/permissions/role membership. Configure the DBMS to produce audit records when it denies attempts to add privileges/permissions/role membership. Configure the DBMS to produce audit records when other errors prevent attempts to add privileges/permissions/role membership.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000495-DB-000328
- Vuln IDs
-
- V-206618
- V-58075
- Rule IDs
-
- SV-206618r961800_rule
- SV-72505
Checks: C-6878r291522_chk
If there is no distinction in the DBMS's security architecture between modifying permissions on the one hand, and adding and deleting permissions on the other hand, this is not a finding. Review DBMS documentation to verify that audit records can be produced when privileges/permissions/role memberships are modified. If the DBMS is not capable of this, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when privileges/permissions/role memberships are modified. If they are not produced, this is a finding.
Fix: F-6878r291523_fix
Deploy a DBMS capable of producing the required audit records when privileges/permissions/role memberships are modified. Configure the DBMS to produce audit records when privileges/permissions/role memberships are modified.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000495-DB-000329
- Vuln IDs
-
- V-206619
- V-58077
- Rule IDs
-
- SV-206619r961800_rule
- SV-72507
Checks: C-6879r291525_chk
If there is no distinction in the DBMS's security architecture between modifying permissions on the one hand, and adding and deleting permissions on the other hand, this is not a finding. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to modify privileges/permissions/role membership. If the DBMS is not capable of this, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to modify privileges/permissions/role membership. If they are not produced, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to modify privileges/permissions/role membership. If they are not produced, this is a finding.
Fix: F-6879r291526_fix
Deploy a DBMS capable of producing the required audit records when it denies or fails to complete attempts to modify privileges/permissions/role membership. Configure the DBMS to produce audit records when it denies attempts to modify privileges/permissions/role membership. Configure the DBMS to produce audit records when other errors prevent attempts to modify privileges/permissions/role membership.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000496-DB-000334
- Vuln IDs
-
- V-206620
- V-58087
- Rule IDs
-
- SV-206620r961803_rule
- SV-72517
Checks: C-6880r291528_chk
If the DBMS architecture makes it impossible for any user, even with the highest privileges, to modify the structure and logic of its built-in security objects, and if there are no additional, locally-defined security objects in the database(s), this is not a finding. Review DBMS documentation to verify that audit records can be produced when security objects are modified. If the DBMS is not capable of this, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when security objects are modified. If they are not produced, this is a finding.
Fix: F-6880r291529_fix
Deploy a DBMS capable of producing the required audit records when security objects, such as tables, views, procedures, and functions, are modified. Configure the DBMS to produce audit records when security objects, such as tables, views, procedures, and functions, are modified.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000496-DB-000335
- Vuln IDs
-
- V-206621
- V-58089
- Rule IDs
-
- SV-206621r961803_rule
- SV-72519
Checks: C-6881r291531_chk
If the DBMS architecture makes it impossible for any user, even with the highest privileges, to modify the structure and logic of its built-in security objects, and if there are no additional, locally-defined security objects in the database(s), this is not a finding. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to modify security objects. If the DBMS is not capable of this, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to modify security objects. If they are not produced, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to modify security objects. If they are not produced, this is a finding.
Fix: F-6881r291532_fix
Deploy a DBMS capable of producing the required audit records when it denies or fails to complete attempts to modify security objects, such as tables, views, procedures, and functions. Configure the DBMS to produce audit records when it denies attempts to modify security objects, to include reads, creations, modifications, and deletions. Configure the DBMS to produce audit records when other errors prevent attempts to modify security objects, to include reads, creations, modifications, and deletions.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000498-DB-000346
- Vuln IDs
-
- V-206622
- V-58099
- Rule IDs
-
- SV-206622r961809_rule
- SV-72529
Checks: C-6882r291534_chk
Review DBMS documentation to verify that audit records can be produced when categories of information are modified. If the DBMS is not capable of this, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when categories of information are modified. If they are not produced, this is a finding.
Fix: F-6882r291535_fix
Deploy a DBMS capable of producing the required audit records when categories of information are modified. Configure the DBMS to produce audit records when categories of information are modified.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000498-DB-000347
- Vuln IDs
-
- V-206623
- V-58101
- Rule IDs
-
- SV-206623r961809_rule
- SV-72531
Checks: C-6883r291537_chk
Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to modify categories of information. If the DBMS is not capable of this, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to modify categories of information. If they are not produced, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to modify categories of information. If they are not produced, this is a finding.
Fix: F-6883r291538_fix
Deploy a DBMS capable of producing the required audit records when it denies or fails to complete modification of categories of information. Configure the DBMS to produce audit records when it denies modification of categories of information. Configure the DBMS to produce audit records when other errors prevent modification of categories of information.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000499-DB-000330
- Vuln IDs
-
- V-206624
- V-58079
- Rule IDs
-
- SV-206624r961812_rule
- SV-72509
Checks: C-6884r291540_chk
Review DBMS documentation to verify that audit records can be produced when privileges/permissions/role memberships are removed, revoked, or denied to any user or role. If the DBMS is not capable of this, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when privileges/permissions/role memberships are removed, revoked, or denied to any user or role. If they are not produced, this is a finding.
Fix: F-6884r291541_fix
Deploy a DBMS capable of producing the required audit records when privileges/permissions/role memberships are removed, revoked, or denied to any user or role. Configure DBMS audit settings to generate an audit record when privileges/permissions/role memberships are removed, revoked, or denied to any user or role.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000499-DB-000331
- Vuln IDs
-
- V-206625
- V-58081
- Rule IDs
-
- SV-206625r961812_rule
- SV-72511
Checks: C-6885r291543_chk
Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts remove, revoke, or deny privileges/permissions/role membership to any user or role. If the DBMS is not capable of this, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to remove, revoke, or deny privileges/permissions/role membership to any user or role. If they are not produced, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to remove, revoke, or deny privileges/permissions/role membership to any user or role. If they are not produced, this is a finding.
Fix: F-6885r291544_fix
Deploy a DBMS capable of producing the required audit records when it denies or fails to complete attempts to remove, revoke, or deny privileges/permissions/role membership to any user or role. Configure the DBMS to produce audit records when it denies attempts to remove, revoke, or deny privileges/permissions/role membership to any user or role. Configure the DBMS to produce audit records when other errors prevent attempts to remove, revoke, or deny privileges/permissions/role membership to any user or role.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000501-DB-000336
- Vuln IDs
-
- V-206626
- V-58091
- Rule IDs
-
- SV-206626r961818_rule
- SV-72521
Checks: C-6886r291546_chk
If the DBMS architecture makes it impossible for any user, even with the highest privileges, to drop its built-in security objects, and if there are no additional, locally-defined security objects in the database(s), this is not a finding. Review DBMS documentation to verify that audit records can be produced when security objects are drop. If the DBMS is not capable of this, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when security objects are drop. If they are not produced, this is a finding.
Fix: F-6886r291547_fix
Deploy a DBMS capable of producing the required audit records when security objects are deleted. Configure the DBMS to produce audit records when security objects are deleted.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000501-DB-000337
- Vuln IDs
-
- V-206627
- V-58093
- Rule IDs
-
- SV-206627r961818_rule
- SV-72523
Checks: C-6887r291549_chk
If the DBMS architecture makes it impossible for any user, even with the highest privileges, to drop its built-in security objects, and if there are no additional, locally-defined security objects in the database(s), this is not a finding. Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to drop security objects. If the DBMS is not capable of this, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to drop security objects. If they are not produced, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to drop security objects. If they are not produced, this is a finding.
Fix: F-6887r291550_fix
Deploy a DBMS capable of producing the required audit records when it denies or fails to complete attempts to delete security objects. Configure the DBMS to produce audit records when it denies attempts to delete security objects. Configure the DBMS to produce audit records when other errors prevent attempts to delete security objects.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000502-DB-000348
- Vuln IDs
-
- V-206628
- V-58103
- Rule IDs
-
- SV-206628r961821_rule
- SV-72533
Checks: C-6888r291552_chk
Review DBMS documentation to verify that audit records can be produced when categories of information are deleted. If the DBMS is not capable of this, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when categories of information are deleted. If they are not produced, this is a finding.
Fix: F-6888r291553_fix
Deploy a DBMS capable of producing the required audit records when categories of information are deleted. Configure the DBMS to produce audit records when categories of information are deleted.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000502-DB-000349
- Vuln IDs
-
- V-206629
- V-58105
- Rule IDs
-
- SV-206629r961821_rule
- SV-72535
Checks: C-6889r291555_chk
Review DBMS documentation to verify that audit records can be produced when the system denies or fails to complete attempts to delete categories of information. If the DBMS is not capable of this, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when the system denies attempts to delete categories of information. If they are not produced, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when other errors prevent attempts to delete categories of information. If they are not produced, this is a finding.
Fix: F-6889r291556_fix
Deploy a DBMS capable of producing the required audit records when it denies or fails to complete deletion of categories of information. Configure the DBMS to produce audit records when it denies deletion of categories of information. Configure the DBMS to produce audit records when other errors prevent deletion of categories of information.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000503-DB-000350
- Vuln IDs
-
- V-206630
- V-58107
- Rule IDs
-
- SV-206630r961824_rule
- SV-72537
Checks: C-6890r291558_chk
Review the DBMS audit settings. If an audit record is not generated each time a user (or other principal) logs on or connects to the DBMS, this is a finding.
Fix: F-6890r291559_fix
Configure DBMS audit settings to generate an audit record each time a user (or other principal) logs on or connects to the DBMS. Ensure that the audit record contains the time of the event, the user ID, and session identifier.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000503-DB-000351
- Vuln IDs
-
- V-206631
- V-58109
- Rule IDs
-
- SV-206631r961824_rule
- SV-72539
Checks: C-6891r291561_chk
Review the DBMS audit settings. If an audit record is not generated each time a user (or other principal) attempts but fails to log on or connect to the DBMS (including attempts where the user ID is invalid/unknown), this is a finding.
Fix: F-6891r291562_fix
Configure DBMS audit settings to generate an audit record each time a user (or other principal) attempts but fails to log on or connect to the DBMS. Include attempts where the user ID is invalid/unknown. Ensure that the audit record contains the time of the event and the user ID that was entered (if any).
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000504-DB-000354
- Vuln IDs
-
- V-206632
- V-58115
- Rule IDs
-
- SV-206632r961827_rule
- SV-72545
Checks: C-6892r291564_chk
Review DBMS documentation to verify that authorized administrative users can designate actions as privileged and that audit records can be produced when privileged actions occur. If the DBMS is not capable of this, this is a finding. Review the system documentation to obtain the definition of the database/DBMS functionality considered privileged in the context of the system in question. Review the DBMS/database security and audit configurations and/or other means used to implement audit logging. If audit logging covers at least all of the actions defined as privileged, this is not a finding; otherwise, this is a finding.
Fix: F-6892r291565_fix
Deploy a DBMS capable of producing the required audit records when privileged actions occur. Configure the DBMS to produce audit records when privileged actions occur.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000504-DB-000355
- Vuln IDs
-
- V-206633
- V-58117
- Rule IDs
-
- SV-206633r961827_rule
- SV-72547
Checks: C-6893r291567_chk
Review DBMS documentation to verify that authorized administrative users can designate actions as privileged and that audit records can be produced when the DBMS prevents attempted privileged actions. If the DBMS is not capable of this, this is a finding. Review the DBMS/database security and audit configurations to verify that audit records are produced when the DBMS prevents attempted privileged actions. If they are not produced, this is a finding.
Fix: F-6893r291568_fix
Deploy a DBMS capable of producing the required audit records when the DBMS prevents attempted privileged action. Configure the DBMS to produce audit records when the DBMS prevents attempted privileged actions.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000505-DB-000352
- Vuln IDs
-
- V-206634
- V-58111
- Rule IDs
-
- SV-206634r961830_rule
- SV-72541
Checks: C-6894r291570_chk
Review the DBMS audit settings. If an audit record is not generated each time a user (or other principal) logs off or disconnects from the DBMS voluntarily, or forced by the system, or because of connection or other failure, this is a finding.
Fix: F-6894r291571_fix
Configure DBMS audit settings to generate an audit record each time a user (or other principal) logs off or disconnects, whether voluntarily or forced by the system, or because of connection or other failure, from the DBMS. Ensure that the audit record contains the time of the event, the user ID, and session identifier.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000506-DB-000353
- Vuln IDs
-
- V-206635
- V-58113
- Rule IDs
-
- SV-206635r961833_rule
- SV-72543
Checks: C-6895r291573_chk
Review the DBMS audit settings. If the fact of multiple, concurrent logons by a given user (or other principal) can be reliably reconstructed from the log entries for other events, then this is not a finding. If an audit record is not generated each time a user (or other principal) who is already connected to the DBMS logs on or connects to the DBMS from a different workstation, this is a finding.
Fix: F-6895r291574_fix
Configure DBMS audit settings to generate an audit record each time a user (or other principal) who is already connected to the DBMS logs on or connects to the DBMS from a different workstation.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000507-DB-000356
- Vuln IDs
-
- V-206636
- V-58119
- Rule IDs
-
- SV-206636r961836_rule
- SV-72549
Checks: C-6896r291576_chk
Review DBMS documentation to verify that administrative users can specify database objects for which access must be audited and can specify which kinds of access must be audited. If the DBMS is not capable of this, this is a finding. Review system documentation to determine whether the application owner has specified database objects (tables, views, procedures, functions, etc.) for which access must be audited. Review the DBMS/database security and audit settings to verify that the specified access to the specified objects is audited. If not, this is a finding.
Fix: F-6896r291577_fix
Deploy a DBMS capable of producing the required audit records when object access occurs. Configure audit settings to create audit records when the specified access to the specified objects occurs.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000507-DB-000357
- Vuln IDs
-
- V-206637
- V-58121
- Rule IDs
-
- SV-206637r961836_rule
- SV-72551
Checks: C-6897r291579_chk
Review DBMS documentation to verify that administrative users can specify database objects for which access must be audited, and can specify which kinds of access must be audited. If the DBMS is not capable of this, this is a finding. Review DBMS documentation to determine whether the application owner has specified database objects (tables, views, procedures, functions, etc.) for which access must be audited. Review the DBMS/database security and audit settings to verify that audit records are created for unsuccessful attempts at the specified access to the specified objects. If not, this is a finding.
Fix: F-6897r291580_fix
Deploy a DBMS capable of producing the required audit records when object access occurs. Configure audit settings to create audit records when the specified access to the specified objects is unsuccessfully attempted.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-APP-000508-DB-000358
- Vuln IDs
-
- V-206638
- V-58123
- Rule IDs
-
- SV-206638r961839_rule
- SV-72553
Checks: C-6898r291582_chk
If the DBMS does not generate audit records for all direct access to the database(s), this is a finding.
Fix: F-6898r291583_fix
Configure the DBMS to generate audit records for all direct access to the database(s).
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000514-DB-000381
- Vuln IDs
-
- V-206639
- V-58159
- Rule IDs
-
- SV-206639r961857_rule
- SV-72589
Checks: C-6899r860650_chk
If the DBMS does not employ NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures, this is a finding.
Fix: F-6899r860651_fix
Implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000514-DB-000382
- Vuln IDs
-
- V-206640
- V-58161
- Rule IDs
-
- SV-206640r961857_rule
- SV-72591
Checks: C-6900r860653_chk
If the DBMS does not employ NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and verify cryptographic hashes, this is a finding.
Fix: F-6900r860654_fix
Implement a NIST FIPS 140-2 or 140-3 validated cryptographic module in the DBMS for generation and verification of cryptographic hashes.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-APP-000514-DB-000383
- Vuln IDs
-
- V-206641
- V-58163
- Rule IDs
-
- SV-206641r961857_rule
- SV-72593
Checks: C-6901r860656_chk
If the DBMS does not employ NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and verify cryptographic hashes, this is a finding.
Fix: F-6901r860657_fix
Implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provide cryptographic protection for the unclassified information that requires it.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-APP-000515-DB-000318
- Vuln IDs
-
- V-206642
- V-58055
- Rule IDs
-
- SV-206642r961860_rule
- SV-72485
Checks: C-6902r291594_chk
Review the system documentation for a description of how audit records are off-loaded. If the DBMS has a continuous network connection to the centralized log management system, but the DBMS audit records are not written directly to the centralized log management system or transferred in near-real-time, this is a finding. If the DBMS does not have a continuous network connection to the centralized log management system, and the DBMS audit records are not transferred to the centralized log management system weekly or more often, this is a finding.
Fix: F-6902r291595_fix
Configure the DBMS or deploy and configure software tools to transfer audit records to a centralized log management system, continuously and in near-real time where a continuous network connection to the log management system exists, or at least weekly in the absence of such a connection.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SRG-APP-000516-DB-000363
- Vuln IDs
-
- V-206643
- V-58131
- Rule IDs
-
- SV-206643r961863_rule
- SV-72561
Checks: C-6903r291597_chk
Review the DBMS documentation and configuration to determine if the DBMS is configured in accordance with DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs and IAVMs. If the DBMS is not configured in accordance with security configuration settings, this is a finding.
Fix: F-6903r291598_fix
Configure the DBMS in accordance with DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs and IAVMs.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- SRG-APP-000416-DB-000380
- Vuln IDs
-
- V-233495
- V-58157
- Rule IDs
-
- SV-233495r962034_rule
- SV-72587
Checks: C-36690r850999_chk
If the DBMS is deployed in an unclassified environment, this is not applicable (NA). If the DBMS is not configured to use NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards, this is a finding.
Fix: F-36655r604916_fix
Deploy a DBMS compatible with the use of NSA-approved cryptography. Configure the DBMS and related system components to use NSA-approved cryptography to protect classified information in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
- RMF Control
- Severity
- M
- CCI
- CCI-003627
- Version
- SRG-APP-000700-DB-000100
- Vuln IDs
-
- V-263602
- Rule IDs
-
- SV-263602r982479_rule
Checks: C-67502r982478_chk
Verify the DBMS is configured to disable accounts when the accounts have expired. If the DBMS is not configured to disable accounts when the accounts have expired, this is a finding.
Fix: F-67410r981963_fix
Configure the DBMS to disable accounts when the accounts have expired.
- RMF Control
- Severity
- M
- CCI
- CCI-003628
- Version
- SRG-APP-000705-DB-000110
- Vuln IDs
-
- V-263603
- Rule IDs
-
- SV-263603r982481_rule
Checks: C-67503r982480_chk
Verify the DBMS is configured to disable accounts when the accounts are no longer associated to a user. If the DBMS is not configured to disable accounts when the accounts are no longer associated to a user, this is a finding.
Fix: F-67411r981966_fix
Configure the DBMS to disable accounts when the accounts are no longer associated to a user.
- RMF Control
- Severity
- M
- CCI
- CCI-003821
- Version
- SRG-APP-000745-DB-000120
- Vuln IDs
-
- V-263604
- Rule IDs
-
- SV-263604r982483_rule
Checks: C-67504r982482_chk
Verify the DBMS is configured to implement the capability to centrally review and analyze audit records from multiple components within the system. If the DBMS is not configured to implement the capability to centrally review and analyze audit records from multiple components within the system, this is a finding.
Fix: F-67412r981969_fix
Configure the DBMS to implement the capability to centrally review and analyze audit records from multiple components within the system.
- RMF Control
- Severity
- M
- CCI
- CCI-003831
- Version
- SRG-APP-000795-DB-000130
- Vuln IDs
-
- V-263605
- Rule IDs
-
- SV-263605r982485_rule
Checks: C-67505r982484_chk
Verify the DBMS is configured to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information. If the DBMS is not configured to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information, this is a finding.
Fix: F-67413r981972_fix
Configure the DBMS to alert organization-defined personnel or roles upon detection of unauthorized access, modification, or deletion of audit information.
- RMF Control
- Severity
- M
- CCI
- CCI-003992
- Version
- SRG-APP-000810-DB-000150
- Vuln IDs
-
- V-263606
- Rule IDs
-
- SV-263606r981976_rule
Checks: C-67506r981974_chk
Verify the DBMS is configured to prevent the installation of organization-defined software and firmware components without verification that the component has been digitally signed using a certificate recognized and approved by the organization. If the DBMS is not configured to prevent the installation of organization-defined software and firmware components without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization, this is a finding.
Fix: F-67414r981975_fix
Configure the DBMS to prevent the installation of organization-defined software and firmware components without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization.
- RMF Control
- Severity
- M
- CCI
- CCI-004045
- Version
- SRG-APP-000815-DB-000160
- Vuln IDs
-
- V-263607
- Rule IDs
-
- SV-263607r982487_rule
Checks: C-67507r982486_chk
Verify the DBMS is configured to require users to be individually authenticated before granting access to the shared accounts or resources. If the DBMS is not configured to require users to be individually authenticated before granting access to the shared accounts or resources, this is a finding.
Fix: F-67415r981978_fix
Configure the DBMS to require users to be individually authenticated before granting access to the shared accounts or resources.
- RMF Control
- Severity
- M
- CCI
- CCI-004046
- Version
- SRG-APP-000820-DB-000170
- Vuln IDs
-
- V-263608
- Rule IDs
-
- SV-263608r981982_rule
Checks: C-67508r981980_chk
Verify the DBMS is configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access. If the DBMS is not configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access, this is a finding.
Fix: F-67416r981981_fix
Configure the DBMS to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- RMF Control
- Severity
- M
- CCI
- CCI-004047
- Version
- SRG-APP-000825-DB-000180
- Vuln IDs
-
- V-263609
- Rule IDs
-
- SV-263609r982489_rule
Checks: C-67509r982488_chk
Verify the DBMS is configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements. If the DBMS is not configured to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements, this is a finding.
Fix: F-67417r981984_fix
Configure the DBMS to implement multifactor authentication for local; network; and/or remote access to privileged accounts; and/or nonprivileged accounts such that the device meets organization-defined strength of mechanism requirements.
- RMF Control
- Severity
- M
- CCI
- CCI-004058
- Version
- SRG-APP-000830-DB-000190
- Vuln IDs
-
- V-263610
- Rule IDs
-
- SV-263610r981988_rule
Checks: C-67510r981986_chk
Verify the DBMS is configured to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency. If the DBMS is not configured to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency, this is a finding.
Fix: F-67418r981987_fix
Configure the DBMS to maintain a list of commonly used, expected, or compromised passwords on an organization-defined frequency.
- RMF Control
- Severity
- M
- CCI
- CCI-004059
- Version
- SRG-APP-000835-DB-000200
- Vuln IDs
-
- V-263611
- Rule IDs
-
- SV-263611r982491_rule
Checks: C-67511r982490_chk
Verify the DBMS is configured to update the list of passwords on an organization-defined frequency. If the DBMS is not configured to update the list of passwords on an organization-defined frequency, this is a finding.
Fix: F-67419r981990_fix
Configure the DBMS to update the list of passwords on an organization-defined frequency.
- RMF Control
- Severity
- M
- CCI
- CCI-004060
- Version
- SRG-APP-000840-DB-000210
- Vuln IDs
-
- V-263612
- Rule IDs
-
- SV-263612r982493_rule
Checks: C-67512r982492_chk
Verify the DBMS is configured to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly. If the DBMS is not configured to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly, this is a finding.
Fix: F-67420r981993_fix
Configure the DBMS to update the list of passwords when organizational passwords are suspected to have been compromised directly or indirectly.
- RMF Control
- Severity
- M
- CCI
- CCI-004061
- Version
- SRG-APP-000845-DB-000220
- Vuln IDs
-
- V-263613
- Rule IDs
-
- SV-263613r982495_rule
Checks: C-67513r982494_chk
Verify the DBMS is configured to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a). If the DBMS is not configured to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a), this is a finding.
Fix: F-67421r981996_fix
Configure the DBMS to verify when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5 (1) (a).
- RMF Control
- Severity
- M
- CCI
- CCI-004063
- Version
- SRG-APP-000855-DB-000240
- Vuln IDs
-
- V-263614
- Rule IDs
-
- SV-263614r982497_rule
Checks: C-67514r982496_chk
Verify the DBMS is configured to require immediate selection of a new password upon account recovery. If the DBMS is not configured to require immediate selection of a new password upon account recovery, this is a finding.
Fix: F-67422r981999_fix
Configure the DBMS to require immediate selection of a new password upon account recovery.
- RMF Control
- Severity
- M
- CCI
- CCI-004064
- Version
- SRG-APP-000860-DB-000250
- Vuln IDs
-
- V-263615
- Rule IDs
-
- SV-263615r982499_rule
Checks: C-67515r982498_chk
Verify the DBMS is configured to allow user selection of long passwords and passphrases, including spaces and all printable characters. If the DBMS is not configured to allow user selection of long passwords and passphrases, including spaces and all printable characters, this is a finding.
Fix: F-67423r982002_fix
Configure the DBMS to allow user selection of long passwords and passphrases, including spaces and all printable characters.
- RMF Control
- Severity
- M
- CCI
- CCI-004065
- Version
- SRG-APP-000865-DB-000260
- Vuln IDs
-
- V-263616
- Rule IDs
-
- SV-263616r982501_rule
Checks: C-67516r982500_chk
Verify the DBMS is configured to employ automated tools to assist the user in selecting strong password authenticators. If the DBMS is not configured to employ automated tools to assist the user in selecting strong password authenticators, this is a finding.
Fix: F-67424r982005_fix
Configure the DBMS to employ automated tools to assist the user in selecting strong password authenticators.
- RMF Control
- Severity
- M
- CCI
- CCI-004068
- Version
- SRG-APP-000875-DB-000280
- Vuln IDs
-
- V-263617
- Rule IDs
-
- SV-263617r982009_rule
Checks: C-67517r982007_chk
Verify the DBMS is configured to implement a local cache of revocation data to support path discovery and validation. If the DBMS is not configured to implement a local cache of revocation data to support path discovery and validation, this is a finding.
Fix: F-67425r982008_fix
Configure the DBMS to implement a local cache of revocation data to support path discovery and validation.
- RMF Control
- Severity
- M
- CCI
- CCI-004192
- Version
- SRG-APP-000880-DB-000290
- Vuln IDs
-
- V-263618
- Rule IDs
-
- SV-263618r982503_rule
Checks: C-67518r982502_chk
Verify the DBMS is configured to protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths. If the DBMS is not configured to protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths, this is a finding.
Fix: F-67426r982011_fix
Configure the DBMS to protect nonlocal maintenance sessions by separating the maintenance session from other network sessions with the system by logically separated communications paths.
- RMF Control
- Severity
- M
- CCI
- CCI-004909
- Version
- SRG-APP-000910-DB-000300
- Vuln IDs
-
- V-263619
- Rule IDs
-
- SV-263619r982505_rule
Checks: C-67519r982504_chk
Verify the DBMS is configured to include only approved trust anchors in trust stores or certificate stores managed by the organization. If the DBMS is not configured to include only approved trust anchors in trust stores or certificate stores managed by the organization, this is a finding.
Fix: F-67427r982014_fix
Configure the DBMS to include only approved trust anchors in trust stores or certificate stores managed by the organization.
- RMF Control
- Severity
- M
- CCI
- CCI-004910
- Version
- SRG-APP-000915-DB-000310
- Vuln IDs
-
- V-263620
- Rule IDs
-
- SV-263620r982507_rule
Checks: C-67520r982506_chk
Verify the DBMS is configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store. If the DBMS is not configured to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store, this is a finding.
Fix: F-67428r982017_fix
Configure the DBMS to provide protected storage for cryptographic keys with organization-defined safeguards and/or hardware protected key store.
- RMF Control
- Severity
- M
- CCI
- CCI-004922
- Version
- SRG-APP-000920-DB-000320
- Vuln IDs
-
- V-263621
- Rule IDs
-
- SV-263621r982509_rule
Checks: C-67521r982508_chk
Verify the DBMS is configured to synchronize system clocks within and between systems or system components. If the DBMS is not configured to synchronize system clocks within and between systems or system components, this is a finding.
Fix: F-67429r982020_fix
Configure the DBMS to synchronize system clocks within and between systems or system components.
- RMF Control
- Severity
- M
- CCI
- CCI-004923
- Version
- SRG-APP-000925-DB-000330
- Vuln IDs
-
- V-263622
- Rule IDs
-
- SV-263622r982511_rule
Checks: C-67522r982510_chk
Verify the DBMS is configured to compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source. If the DBMS is not configured to compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source, this is a finding.
Fix: F-67430r982023_fix
Configure the DBMS to compare the internal system clocks on an organization-defined frequency with organization-defined authoritative time source.
- RMF Control
- SA-22
- Severity
- H
- CCI
- CCI-003376
- Version
- SRG-APP-000456-DB-000400
- Vuln IDs
-
- V-265854
- Rule IDs
-
- SV-265854r999381_rule
Checks: C-69773r999379_chk
(DBMS Product, Version) is no longer supported by the vendor. If the system is running (DBMS Product, Version), this is a finding.
Fix: F-69677r999380_fix
Upgrade unsupported DBMS or unsupported components to a supported version of the product.