Overview:
Title: Applications must provide the capability to centralize the review and analysis of audit records from multiple components within the system.
Vulnerability ID: V-32385
STIG ID:
IA Controls: None
Severity: medium
Description: Successful incident response and auditing relies on timely, accurate system information and analysis in order to allow the organization to identify and respond to potential incidents in a proficient manner.
Segregation of logging data to multiple disparate computer systems is counter-productive and makes log analysis and log event alarming difficult to implement and manage, particularly when the system or application has multiple logging components written to different locations or systems.
Databases do not provide the capability to centralize the review and analysis of audit records from multiple components. This requirement is NA for databases.
Check Text: This check is NA for databases.
Fix Text: This fix is NA for databases.
[divider]Interpreting V-32385:
Coming Soon!
Return to the DoD STIGs – Database Security Requirements Guide