UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

If passwords are used for authentication, the DBMS must transmit only encrypted representations of passwords.


Overview

Finding ID Version Rule ID IA Controls Severity
V-32469 SRG-APP-000172-DB-000075 SV-42806r3_rule Medium
Description
The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on User ID and Password may be used only when it is not possible to employ a PKI certificate, and requires AO approval. In such cases, passwords need to be protected at all times, and encryption is the standard method for protecting passwords during transmission. DBMS passwords sent in clear text format across the network are vulnerable to discovery by unauthorized users. Disclosure of passwords may easily lead to unauthorized access to the database.
STIG Date
Database Security Requirements Guide 2015-06-23

Details

Check Text ( C-40907r3_chk )
Review configuration settings for encrypting passwords in transit across the network. If passwords are not encrypted, this is a finding.

If it is determined that passwords are passed unencrypted at any point along the transmission path between the source and destination, this is a finding.
Fix Text (F-36384r2_fix)
Configure encryption for transmission of passwords across the network. If the database does not provide encryption for logon events natively, employ encryption at the OS or network level.

Ensure passwords remain encrypted from source to destination.