DoD STIGs – V-32375

Overview:

Title: The DBMS must include organization defined additional, more detailed information in the audit records for audit events identified by type, location, or subject.

Vulnerability ID: V-32375

STIG ID:

IA Controls: None

Severity: medium

Description: Information system auditing capability is critical for accurate forensic analysis. Audit record content that may be necessary to satisfy the requirement of this control includes: timestamps, source and destination addresses, user/process identifiers, event descriptions, success/fail indications, file names involved, and access control or flow control rules invoked.

In addition, the application must have the capability to include organization defined additional, more detailed information in the audit records for audit events. These events may be identified by type, location, or subject.

An example of detailed information the organization may require in audit records is full-text recording of privileged commands or the individual identities of group account users.

Some organizations may determine that more detailed information is required for specific database event types. If this information is not available it could negatively impact forensic investigations into user actions or other malicious events.

Check Text: Check DBMS settings and existing audit records to verify any organization defined additional, more detailed information is in the audit records for audit events identified by type, location, or subject. If any organization defined additional, more detailed information exists and is not contained in the audit records, this is a finding.

Fix Text: Modify DBMS audit settings to include any organization defined additional, more detailed information is in the audit records for audit events identified by type, location, or subject.

[divider]

Interpreting V-32375:

SQl Server Audit allows the capture of a LOT of different data points when the audit is triggered. There are basics that should be covered: Who, what, when, etc. but your organization may have other infomration that is required to be collected. This STIG is to make sure you are collecting all the data that is required to stand up to formal external audit procedures.

Return to the DoD STIGs – Database Security Requirements Guide

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.