Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-32409 | SRG-APP-000132-DB-000089 | SV-42746r1_rule | Medium |
Description |
---|
Regarding access restrictions for changes made to organization defined information system components and system level information, any changes to the hardware, software, and/or firmware components of the information system and/or application can potentially have significant effects on the overall security of the system. Accordingly, only qualified and authorized individuals are allowed to obtain access to information system components for purposes of initiating changes, including upgrades and modifications. A two-person rule requires two separate individuals acknowledge and approve those changes. Two-person rule for changes to critical application components helps to reduce risks pertaining to availability and integrity. |
STIG | Date |
---|---|
Database Security Requirements Guide | 2012-07-02 |
Check Text ( C-40850r2_chk ) |
---|
If the organization has not defined components and system level information that requires dual authorization, this is NA. Review DBMS vendor documentation to determine whether the DBMS software can provide dual authorization capabilities. If the DBMS does not support dual authorization, this is a finding. Review DBMS settings to verify dual authorization is enabled for organization defined application components and system-level information. If dual authorization is not enabled, this is a finding. |
Fix Text (F-36323r2_fix) |
---|
Configure DBMS software to enable dual authorization for organization defined application components and system-level information. If DBMS does not support dual authorization, utilize a DBMS or third-party product that provides dual authorization. |