UCF STIG Viewer Logo

When updates are applied to the DBMS software, any software components that have been replaced or made unnecessary must be removed.


Overview

Finding ID Version Rule ID IA Controls Severity
V-58175 SRG-APP-000454-DB-000389 SV-72605r1_rule Medium
Description
Previous versions of DBMS components that are not removed from the information system after updates have been installed may be exploited by adversaries. Some DBMSs' installation tools may remove older versions of software automatically from the information system. In other cases, manual review and removal will be required. In planning installations and upgrades, organizations must include steps (automated, manual, or both) to identify and remove the outdated modules. A transition period may be necessary when both the old and the new software are required. This should be taken into account in the planning.
STIG Date
Database Security Requirements Guide 2016-03-18

Details

Check Text ( C-58945r1_chk )
If software components that have been replaced or made unnecessary are not removed, this is a finding.
Fix Text (F-63383r1_fix)
Identify and remove software components that have been replaced or made unnecessary.