DoD STIGs – V-32540

Overview:

Title: The DBMS must employ automated mechanisms to alert security personnel of inappropriate or unusual activities with security implications.

Vulnerability ID: V-32540

STIG ID:

IA Controls: None

Severity: medium

Description: Applications will typically utilize logging mechanisms for maintaining a historical log of activity that occurs within the application. This information can then be used for diagnostic purposes, forensics purposes, or other purposes relevant to ensuring the availability and integrity of the application.

While it is important to log events identified as being critical and relevant to security, it is equally important to notify the appropriate personnel in a timely manner, so they are able to respond to events as they occur.

Solutions that include a manual notification procedure do not offer the reliability and speed of an automated notification solution. Applications must employ automated mechanisms to alert security personnel of inappropriate or unusual activities that have security implications. If this capability is not built directly into the application, the application must be able to integrate with existing security infrastructure that provides this capability.

Database management systems, that do not automatically alert security personnel of unusual activities, run the risk of security incidents going unnoticed for long periods of time. This can allow security breaches to be ongoing and more serious.

Check Text: Check DBMS settings to determine whether security personnel are alerted automatically when unusual or security related activities are detected on the database. If security personnel are not automatically alerted, this is a finding.

Fix Text: Configure database to automatically alert security personnel of inappropriate or unusual activities with security implications.

[divider]

Interpreting V-32540:

Coming Soon!

Return to the DoD STIGs – Database Security Requirements Guide

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.