DoD STIGs – V-32388


Title: The DBMS must provide a report generation capability for audit reduction data.

Vulnerability ID: V-32388


IA Controls: None

Severity: low

Description: In support of Audit Review, Analysis, and Reporting requirements, audit reduction is a technique used to reduce the volume of audit records in order to facilitate a manual review.

Before a security review is conducted, information systems and/or applications with an audit reduction capability may remove many audit records known to have little security significance. This is generally accomplished by removing records generated by specified classes of events, such as records generated by nightly backups.

In order to identify and report on what (repetitive) data has been removed via the use of audit reduction, the application must provide a capability to generate reports containing what values were removed by the audit reduction.

Audit reduction does not alter original audit records. An audit reduction capability provides support for near real-time audit review and analysis based on policy based requirements and after-the-fact investigations of security incidents.

Reporting tools employing audit reduction methods must not alter the original audit data. An example of a tool employing audit reduction methods is the Windows Event Viewer tool which is used to view and analyze audit logs on Windows systems.

The lack of reporting tools for audit reduction can require the DBA, or others responsible for reviewing audit logs, to sort through large amounts of data in order to find relevant records. This can cause important audit records to be missed.

Check Text: Review DBMS to determine whether report generation specific to audit reduction capabilities are being provided. If the DBMS does not provide report generation specific to audit log reduction this may be handled by a separate application. If there are no report generation capabilities specific to audit log reduction in either the DBMS or a separate application, this is a finding.

Fix Text: Utilize a DBMS or separate audit log reduction application that provides report generation capabilities specific to audit log reduction.


Interpreting V-32388:

Coming Soon!

Return to the DoD STIGs – Database Security Requirements Guide

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.