Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-32478 | SRG-APP-000177-DB-000069 | SV-42815r1_rule | Medium |
Description |
---|
The cornerstone of the PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user information. When including the DBMS in the Private Key Infrastructure, the authenticated user must map directly to a user account in the DBMS. If the user account is not directly tied to the authenticated identity there is no way to know which, if any, database user account has been authorized. |
STIG | Date |
---|---|
Database Security Requirements Guide | 2012-07-02 |
Check Text ( C-40915r1_chk ) |
---|
Review DBMS configuration to verify DBMS user accounts are being mapped directly to authenticated identity information being passed via the PKI. If user accounts are not being mapped to authenticated identity information being passed via the PKI, this is a finding. |
Fix Text (F-36392r1_fix) |
---|
Configure the DBMS to map the authenticated identity directly to the DBMS user account. |