UCF STIG Viewer Logo

The DBMS must limit the use of resources by priority and not impede the host from servicing processes designated as a higher-priority.


Overview

Finding ID Version Rule ID IA Controls Severity
V-32552 SRG-APP-000248-DB-000135 SV-42889r1_rule Low
Description
Priority protection helps prevent a lower-priority process from delaying or interfering with the information system servicing any higher-priority process. This control does not apply to components in the information system for which there is only a single user/role. The application must limit the use of resources by priority. The DBMS is often running queries for multiple users. If lower priority processes are utilizing a disproportionately high amount of database resources, this can severely impact higher priority processes.
STIG Date
Database Security Requirements Guide 2012-07-02

Details

Check Text ( C-40991r1_chk )
Review DBMS settings and documentation to determine if the DBMS restricts resource usage by priority. If the DBMS does not restrict resource usage by priority, this is a finding.
Fix Text (F-36467r1_fix)
Implement measures to restrict the usage of resources by priority.