UCF STIG Viewer Logo

The DBMS must provide the capability for authorized users to capture, record, and log all content related to a user session.


Overview

Finding ID Version Rule ID IA Controls Severity
V-32366 SRG-APP-000093-DB-000052 SV-42703r3_rule Medium
Description
Without the capability to capture, record, and log all content related to a user session, investigations into suspicious user activity would be hampered. Typically, this DBMS capability would be used in conjunction with comparable monitoring of a user's online session, involving other software components such as operating systems, web servers and front-end user applications. The current requirement, however, deals specifically with the DBMS.
STIG Date
Database Security Requirements Guide 2015-12-21

Details

Check Text ( C-40808r2_chk )
Review DBMS vendor documentation to determine whether the DBMS is capable of capturing, recording, and logging all content related to an established user session.

If the DBMS is not capable of these actions, this is a finding.
Fix Text (F-36281r2_fix)
Deploy a DBMS capable of capturing, recording, and logging all content related to an established user session, or acquire a third-party application to perform this function.