DoD STIGs – V-32260

Overview:

Title: The DBMS must display the number of failed login attempts made with a user account upon successful login of that user account.

Vulnerability ID: V-32260

STIG ID:

IA Controls: None

Severity: low

Description: Users need to be aware of activity that occurs regarding their application account. Providing users with information regarding the number of unsuccessful attempts made to login to their account allows the user to determine if any unauthorized activity has occurred and gives them an opportunity to notify administrators.

This requirement is intended to cover both traditional logons to information systems and general accesses to information systems that occur in other types of architectural configurations (e.g., service oriented architectures).

Unauthorized access to DBMS accounts may go undetected if account access is not monitored. Authorized users may serve as a reliable party to report unauthorized use of their account.

Check Text: This requirement applies to interactive accounts only.

Test access reports upon login to DBMS user accounts. On some systems this information may be displayed at the OS login level. If the system displays this information at the OS level, this is not a finding.

If the last successful and number of unsuccessful attempts since the last successful attempt are not reported, this is a finding.

Fix Text: Implement an automated method to display, at interactive logon, the time and date of the last successful login and the number of failed login attempts since the last successful login for users that access the database interactively.

[divider]

Interpreting V-32260:

Coming Soon!

Return to the DoD STIGs – Database Security Requirements Guide

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.