UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The DBMS must produce audit records containing sufficient information to establish where the events occurred.


Overview

Finding ID Version Rule ID IA Controls Severity
V-32370 SRG-APP-000097-DB-000041 SV-42707r3_rule Medium
Description
Information system auditing capability is critical for accurate forensic analysis. Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events relating to an incident. In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know where events occurred, such as application components, modules, session identifiers, filenames, host names, and functionality. Associating information about where the event occurred within the application provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured application.
STIG Date
Database Security Requirements Guide 2017-11-30

Details

Check Text ( C-40812r3_chk )
Check DBMS settings and existing audit records to verify information specific to where the event occurred is being captured and stored with the audit records.

If audit records exist without information regarding where the event occurred, this is a finding.
Fix Text (F-36285r3_fix)
Configure DBMS audit settings to include where the event occurred as part of the audit record.