DoD STIGs – V-32370

Overview:

Title: The DBMS must produce audit records containing sufficient information to establish where the events occurred.

Vulnerability ID: V-32370

STIG ID:

IA Controls: None

Severity: medium

Description: Information system auditing capability is critical for accurate forensic analysis. Audit record content that may be necessary to satisfy the requirement of this control includes: time stamps, source and destination addresses, user/process identifiers, event descriptions, success/fail indications, file names involved, and access control or flow control rules invoked.

Without sufficient information establishing where the audit events occurred, investigation into the cause of events is severely hindered.

Check Text: Check DBMS settings and existing audit records to verify information specific to where the event occurred is being captured and stored with the audit records. If audit records exist without information regarding where the event occurred, this is a finding.

Fix Text: Modify DBMS audit settings to include where the event occurred as part of the audit record.

[divider]

Interpreting V-32370:

There is a lot of information that can be captured and traced using SQL Server’s auditing tools. Some of the information collected can be used to determine where events occur. These include server_princiapl_name, target_server_principal_name and the server_instance_name among others.

 

Return to the DoD STIGs – Database Security Requirements Guide

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.