UCF STIG Viewer Logo

Default demonstration and sample databases, database objects, and applications must be removed.


Overview

Finding ID Version Rule ID IA Controls Severity
V-74477 DB2X-00-003400 SV-89151r1_rule Medium
Description
Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, provided by default, may not be necessary to support essential organizational operations (e.g., key missions, functions). It is detrimental for software products to provide, or install by default, functionality exceeding requirements or mission objectives. Examples include, but are not limited to, installing advertising software, demonstrations, or browser plugins not related to requirements or providing a wide array of functionality, not required for every mission, that cannot be disabled. DBMSs must adhere to the principles of least functionality by providing only essential capabilities. Demonstration and sample database objects and applications present publicly known attack points for malicious users. These demonstration and sample objects are meant to provide simple examples of coding specific functions and are not developed to prevent vulnerabilities from being introduced to the DBMS and host system.
STIG Date
IBM DB2 V10.5 LUW Security Technical Implementation Guide 2018-09-13

Details

Check Text ( C-74403r1_chk )
Use the list db directory to see if the SAMPLE database exists.

$db2 list db directory

If the SAMPLE database exists, this is a finding.
Fix Text (F-81077r1_fix)
Run the following command to DROP the SAMPLE database:

$db2 drop database sample