UCF STIG Viewer Logo

The DBMS must produce audit records containing sufficient information to establish where the events occurred.


Overview

Finding ID Version Rule ID IA Controls Severity
V-206530 SRG-APP-000097-DB-000041 SV-206530r617447_rule Medium
Description
Information system auditing capability is critical for accurate forensic analysis. Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events relating to an incident. In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know where events occurred, such as application components, modules, session identifiers, filenames, host names, and functionality. Associating information about where the event occurred within the application provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured application.
STIG Date
Database Security Requirements Guide 2022-06-13

Details

Check Text ( C-6790r291258_chk )
Check DBMS settings and existing audit records to verify information specific to where the event occurred is being captured and stored with the audit records.

If audit records exist without information regarding where the event occurred, this is a finding.
Fix Text (F-6790r291259_fix)
Configure DBMS audit settings to include where the event occurred as part of the audit record.