STIGs Image

DoD STIGs – V-32189

Overview: Title: The DBMS must support the disabling of network protocols deemed by the organization to be non-secure. Vulnerability ID: V-32189 STIG ID: IA Controls: None Severity: medium

STIGs Image

DoD STIGs – V-32187

Overview: Title: The application must monitor for unauthorized remote connections to the information system on an organization defined frequency. Vulnerability ID: V-32187 STIG ID: IA Controls: None

STIGs Image

DoD STIGs – V-32186

Overview: Title: The DBMS must allow all remote access to be routed through managed access control points. Vulnerability ID: V-32186 STIG ID: IA Controls: None Severity: medium Description: This requirement relates to the use of applications providing remote access services. Remote access is any access to an organizational information system by a user (or an information system) communicating through an …

STIGs Image

DoD STIGs – V-32182

Overview: Title: The DBMS must utilize approved cryptography when passing authentication data for remote access sessions. Vulnerability ID: V-32182 STIG ID: IA Controls: None Severity: medium

STIGs Image

DoD STIGs – V-32184

Overview: Title: A DBMS providing remote access capabilities must utilize approved cryptography to protect the integrity of remote access sessions. Vulnerability ID: V-32184 STIG ID: IA Controls: None

STIGs Image

DoD STIGs – V-32415

Overview: Title: Database software, applications and configuration files must be monitored to discover unauthorized changes. Vulnerability ID: V-32415 STIG ID: IA Controls: None Severity: medium Description: When dealing with change control issues, it should be noted any changes to the hardware, software, and/or firmware components of the information system and/or application can potentially have significant effects on the overall security …