UCF STIG Viewer Logo

The DBMS must produce audit records containing sufficient information to establish the sources (origins) of the events.


Overview

Finding ID Version Rule ID IA Controls Severity
V-32371 SRG-APP-000098-DB-000042 SV-42708r1_rule Medium
Description
Information system auditing capability is critical for accurate forensic analysis. Audit record content that may be necessary to satisfy the requirement of this control, includes, but is not limited to: time stamps, source and destination IP addresses, user/process identifiers, event descriptions, application specific events, success/fail indications, file names involved, access control or flow control rules invoked. Without information establishing the source of activity, the value of audit records from a forensics perspective is questionable.
STIG Date
Database Security Requirements Guide 2012-07-02

Details

Check Text ( C-40813r1_chk )
Check DBMS settings and existing audit records to verify information specific to the source (origin) of the event is being captured and stored with audit records. If audit records exist without information regarding the source of the event, this is a finding.
Fix Text (F-36286r1_fix)
Modify DBMS audit settings to include the source of the event as part of the audit record.