Title: The DBMS must not share resources used to interface with systems operating at different security levels.
Vulnerability ID: V-32548
IA Controls: None
Description: The purpose of this control is to prevent information, including encrypted representations of information, produced by the actions of a prior user/role (or the actions of a process acting on behalf of a prior user/role) from being available to any current user/role (or current process) that obtains access to a shared system resource (e.g., registers, main memory, secondary storage) after the resource has been released back to the information system. Shared resources include memory, input/output queues, and network interface cards.
DBMS installations with different security levels have different access and security requirements. Shared DBMS installations secured at a lower-level can lead to exploitation of higher-level installations.
Check Text: Review the system documentation to determine if the DBMS host contains DBMS installations with differing security levels. If the DBMS host contains DBMS installations with different security levels, this is a finding.
Fix Text: Establish separate host systems for DBMS installations of different security levels.[divider]