Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-32371 | SRG-APP-000098-DB-000042 | SV-42708r1_rule | Medium |
Description |
---|
Information system auditing capability is critical for accurate forensic analysis. Audit record content that may be necessary to satisfy the requirement of this control, includes, but is not limited to: time stamps, source and destination IP addresses, user/process identifiers, event descriptions, application specific events, success/fail indications, file names involved, access control or flow control rules invoked. Without information establishing the source of activity, the value of audit records from a forensics perspective is questionable. |
STIG | Date |
---|---|
Database Security Requirements Guide | 2012-07-02 |
Check Text ( C-40813r1_chk ) |
---|
Check DBMS settings and existing audit records to verify information specific to the source (origin) of the event is being captured and stored with audit records. If audit records exist without information regarding the source of the event, this is a finding. |
Fix Text (F-36286r1_fix) |
---|
Modify DBMS audit settings to include the source of the event as part of the audit record. |