Overview:
Title: The DBMS must limit the use of resources by priority and not impede the host from servicing processes designated as a higher-priority.
Vulnerability ID: V-32552
STIG ID:
IA Controls: None
Severity: low
Description: Priority protection helps prevent a lower-priority process from delaying or interfering with the information system servicing any higher-priority process. This control does not apply to components in the information system for which there is only a single user/role. The application must limit the use of resources by priority.
The DBMS is often running queries for multiple users. If lower priority processes are utilizing a disproportionately high amount of database resources, this can severely impact higher priority processes.
Check Text: Review DBMS settings and documentation to determine if the DBMS restricts resource usage by priority. If the DBMS does not restrict resource usage by priority, this is a finding.
Fix Text: Implement measures to restrict the usage of resources by priority.
[divider]Interpreting V-32552:
Coming Soon!
Return to the DoD STIGs – Database Security Requirements Guide