UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Applications related to incident tracking must support organizational requirements to employ automated mechanisms to assist in the tracking of security incidents.


Overview

Finding ID Version Rule ID IA Controls Severity
V-32484 SRG-APP-000182-DB-NA SV-42821r1_rule Medium
Description
Incident tracking is a method of monitoring networks and systems for activity indicative of viral infection or system attack. Monitoring for this type of activity provides the organization with the capability to proactively detect and respond to attacks. Automated mechanisms for tracking security incidents and collecting/analyzing incident information include the Einstein network monitoring device and monitoring online Computer Incident Response Centers (CIRCs) or other electronic databases of incidents. This requirement is specific to applications responsible for performing incident tracking. This requirement is NA for databases.
STIG Date
Database Security Requirements Guide 2012-07-02

Details

Check Text ( C-40921r1_chk )
This check is NA for databases.
Fix Text (F-36398r1_fix)
This fix is NA for databases.