DoD STIGs – V-32371

Overview:

Title: The DBMS must produce audit records containing sufficient information to establish the sources (origins) of the events.

Vulnerability ID: V-32371

STIG ID:

IA Controls: None

Severity: medium

Description: Information system auditing capability is critical for accurate forensic analysis. Audit record content that may be necessary to satisfy the requirement of this control, includes, but is not limited to: time stamps, source and destination IP addresses, user/process identifiers, event descriptions, application specific events, success/fail indications, file names involved, access control or flow control rules invoked.

Without information establishing the source of activity, the value of audit records from a forensics perspective is questionable.

Check Text: Check DBMS settings and existing audit records to verify information specific to the source (origin) of the event is being captured and stored with audit records. If audit records exist without information regarding the source of the event, this is a finding.

Fix Text: Modify DBMS audit settings to include the source of the event as part of the audit record.

[divider]

Interpreting V-32371:

Make sure that any auditing setup against the SQL Server is capturing the source of the event. This means source IP address, application, user, etc.

All this information can be used after an audit to determine what the potential breach was, along as where it originated from so appropriate steps can be taken to protect the SQL Server going forward.

Return to the DoD STIGs – Database Security Requirements Guide

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.