DoD STIGs – V-32552

Overview:

Title: The DBMS must limit the use of resources by priority and not impede the host from servicing processes designated as a higher-priority.

Vulnerability ID: V-32552

STIG ID:

IA Controls: None

Severity: low

Description: Priority protection helps prevent a lower-priority process from delaying or interfering with the information system servicing any higher-priority process. This control does not apply to components in the information system for which there is only a single user/role. The application must limit the use of resources by priority.

The DBMS is often running queries for multiple users. If lower priority processes are utilizing a disproportionately high amount of database resources, this can severely impact higher priority processes.

Check Text: Review DBMS settings and documentation to determine if the DBMS restricts resource usage by priority. If the DBMS does not restrict resource usage by priority, this is a finding.

Fix Text: Implement measures to restrict the usage of resources by priority.

[divider]

Interpreting V-32552:

Coming Soon!

Return to the DoD STIGs – Database Security Requirements Guide

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.