UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The DBMS must allow designated organizational personnel to select which auditable events are to be audited by the database.


Overview

Finding ID Version Rule ID IA Controls Severity
V-32363 SRG-APP-000090-DB-000065 SV-42700r1_rule Medium
Description
The list of audited events is the set of events for which audits are to be generated. This set of events is typically a subset of the list of all events for which the system is capable of generating audit records (i.e., auditable events, timestamps, source and destination addresses, user/process identifiers, event descriptions, success/fail indications, file names involved, and access control or flow control rules invoked). If the list of auditable events is not configurable, events that should be caught by auditing may be missed. This may allow malicious activity to be overlooked.
STIG Date
Database Security Requirements Guide 2012-07-02

Details

Check Text ( C-40805r1_chk )
Check DBMS settings and documentation to determine whether designated personnel are able to select which auditable events are being audited. If designated personnel are not able to configure auditable events, this is a finding.
Fix Text (F-36278r1_fix)
Configure the DBMS’s settings to allow designated personnel to select which auditable events are audited.