UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The application must either implement compensating security controls or the organization explicitly accepts the risk of not performing the verification as required.


Overview

Finding ID Version Rule ID IA Controls Severity
V-32594 SRG-APP-000289-DB-NA SV-42931r1_rule Medium
Description
Application security functional testing involves testing the application for conformance to the applications security function specifications, as well as, for the underlying security model. The need to verify security functionality applies to all security functions. The conformance criteria state the conditions necessary for the application to exhibit the desired security behavior or satisfy a security property for example, successful login triggers an audit entry. Organizations may define conditions requiring verification and the frequency in which such testing occurs. Security function testing usually occurs during the development phase and can in some instances occur in the production phase if the developer provides the security conformance criteria or if the conformance criteria can be established. There are application testing frameworks available that can perform functional testing on production systems however they are limited in their applicability and are language or product centric. This requirement is specific to applications providing automated testing functionality. This requirement is NA for databases.
STIG Date
Database Security Requirements Guide 2012-07-02

Details

Check Text ( C-41033r1_chk )
This check is NA for databases.
Fix Text (F-36509r1_fix)
This fix is NA for databases.