UCF STIG Viewer Logo

Applications must respond to security function anomalies in accordance with organization defined responses and alternative action(s).


Overview

Finding ID Version Rule ID IA Controls Severity
V-32503 SRG-APP-000200-DB-NA SV-42840r1_rule Medium
Description
The need to verify security functionality applies to all security functions. For those security functions not able to execute automated self-tests the organization either implements compensating security controls or explicitly accepts the risk of not performing the verification as required. Information system transitional states include startup, restart, shutdown, and abort. This requirement is specific to applications providing automated testing functionality. This requirement is NA for databases.
STIG Date
Database Security Requirements Guide 2012-07-02

Details

Check Text ( C-40941r1_chk )
This check is NA for databases.
Fix Text (F-36418r1_fix)
This fix is NA for databases.