DoD STIGs – V-32550

Overview:

Title: The DBMS must restrict the ability of users to launch Denial of Service (DoS) attacks against other information systems or networks.

Vulnerability ID: V-32550

STIG ID:

IA Controls: None

Severity: low

Description: When it comes to DoS attacks most of the attention is paid to ensuring that systems and applications are not victims of these attacks.

While it is true that those accountable for systems want to ensure they are not affected by a DoS attack, they also need to ensure their systems and applications are not used to launch such an attack against others. To that extent, a variety of technologies exist to limit, or in some cases, eliminate the effects of DoS attacks.

For example, boundary protection devices can filter certain types of packets to protect devices from being directly affected by DoS attacks. Limiting system resources that are allocated to any user to a bare minimum may also reduce the ability of users to launch some DoS attacks.

Applications and application developers must take the steps needed to ensure users cannot use these applications to launch DoS attacks against other systems and networks. An example would be designing applications to include mechanisms that throttle network traffic so users are not able to generate unlimited network traffic via the application.

The methods employed to counter this risk will be dependent upon the potential application layer methods that can be used to exploit it.

Check Text: Review DBMS settings and custom database code to determine whether the DBMS or database application code could be used to launch DoS attacks. If the DBMS or custom database code would facilitate DoS style attacks against other information systems, this is a finding.

Fix Text: Configure DBMS settings to restrict functionality that could be used to initiate DoS attacks.

Modify custom database code to not allow it to be used to initiate DoS attacks.

[divider]

Interpreting V-32550:

Coming Soon!

Return to the DoD STIGs – Database Security Requirements Guide

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.