DoD STIGs – V-32592


Title:  The DBMS must support taking organization defined list of least disruptive actions to terminate suspicious events

Vulnerability ID: V-32592

STIG ID: SRG-APP-000287-DB-000126

IA Controls: None

Severity: Medium

Description: System availability is a key tenet of system security. Organizations need to have the flexibility to be able to define the automated actions taken in response to an identified incident. This includes being able to define a least disruptive action the application takes to terminate suspicious events. A least disruptive action may include initiating a request for human response rather than blocking traffic or disrupting system operation. In order to preserve availability, it is important for the DBMS to terminate suspicious events with the least disruptive action possible. If suspicious events are not terminated an attacker may gain entry into the system, however, if the system overreacts to a suspicious event and takes an overly disruptive action a Denial of Service (DoS) may occur.

Check Text: Review DBMS configuration to verify the database will be subject to the least disruptive action to terminate suspicious events. The DBMS must take action from an organization defined list of least disruptive actions. If it does not, this is a finding.

Fix Text: Configure the DBMS to take the least disruptive action from an organization defined list of actions to terminate suspicious events when suspicious events occur.


Interpreting V-32592:

Coming Soon!

Return to the DoD STIGs – Database Security Requirements Guide

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.