UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

When implemented for discovery protection against unidentified or rogue databases, the DBN-6300 must provide a catalog of all visible databases and database services.


Overview

Finding ID Version Rule ID IA Controls Severity
V-65059 DBNW-IP-000061 SV-79549r1_rule Medium
Description
If the DBN-6300 is installed incorrectly in the site's network architecture, vulnerable or unknown databases may not be detected and consequently may remain vulnerable and unprotected. For proper functionality of the DBN-6300, it is necessary to examine the discovered databases to see that an expected wide variety and number of them are covered. If the DBN-6300 is not able to see and detect database services, it will not be able to monitor the databases against threats.
STIG Date
DBN-6300 IDPS Security Technical Implementation Guide 2017-09-15

Details

Check Text ( C-65685r3_chk )
Ask the site representative if the DBN-6300 is used to provide discovery protection against unidentified or rogue databases.

If the DBN-6300 is not used for discovery protection against unidentified or rogue databases, this is not a finding.

Click on the "Database" tab and select the "Database Services" sub-menu. This will reveal all of the currently discovered database services.

If the DBN-6300, which is used to provide protection against unidentified or rogue databases, does not provide a catalog of all visible databases and database services, this is a finding.
Fix Text (F-70999r3_fix)
Configure the system to view databases and database services.

Click on the Database >> Service Discovery tab.

This will reveal all of the currently visible database services that have been seen on the mirrored traffic connection.