DoD STIGs – V-32183

STIGs Image

Overview: Title: A DBMS providing remote access capabilities must utilize organization defined cryptography to protect the confidentiality of data passing over remote access sessions. Vulnerability ID: V-32183

DoD STIGs – V-32189

STIGs Image

Overview: Title: The DBMS must support the disabling of network protocols deemed by the organization to be non-secure. Vulnerability ID: V-32189 STIG ID: IA Controls: None Severity: medium

DoD STIGs – V-32187

STIGs Image

Overview: Title: The application must monitor for unauthorized remote connections to the information system on an organization defined frequency. Vulnerability ID: V-32187 STIG ID: IA Controls: None

DoD STIGs – V-32186

STIGs Image

Overview: Title: The DBMS must allow all remote access to be routed through managed access control points. Vulnerability ID: V-32186 STIG ID: IA Controls: None Severity: medium Description: This requirement relates to the use of applications providing remote access services. Remote access is any access to an organizational information system by a user (or an information system) communicating through an …

DoD STIGs – V-32182

STIGs Image

Overview: Title: The DBMS must utilize approved cryptography when passing authentication data for remote access sessions. Vulnerability ID: V-32182 STIG ID: IA Controls: None Severity: medium

DoD STIGs – V-32184

STIGs Image

Overview: Title: A DBMS providing remote access capabilities must utilize approved cryptography to protect the integrity of remote access sessions. Vulnerability ID: V-32184 STIG ID: IA Controls: None