DoD STIGs – V-32255

Overview:

Title: The DBMS must have its auditing configured to reduce the likelihood of storage capacity being exceeded.

Vulnerability ID: V-32255

STIG ID:

IA Controls: None

Severity: medium

Description: Applications need to be cognizant of potential audit log storage capacity issues. During the installation and/or configuration process, applications should detect and determine if adequate storage capacity has been allocated for audit logs.

During the installation process, a notification may be provided to the installer indicating, based on the auditing configuration chosen and the amount of storage space allocated for audit logs, the amount of storage capacity available is not sufficient enough to meet storage requirements.

Logging must be configured appropriately. If the logs generated outstrip the amount of space reserved for those logs the system may shut down or take other measures to stop processing in order to protect transactions from continuing unlogged.

Check Text: Review the DBMS settings to determine whether logging is configured to produce logs consistent with the amount of space allocated for logging. If auditing will generate excessive logs it may outgrow the space reserved for logging, this is a finding.

Fix Text: Configure auditing to generate audit logs that will stay within the amount of logs the system was sized to support.

[divider]

Interpreting V-32255:

Coming Soon!

Return to the DoD STIGs – Database Security Requirements Guide

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.