UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Redis Enterprise DBMS must generate audit records for DoD-defined auditable events within all DBMS/database components.


Overview

Finding ID Version Rule ID IA Controls Severity
V-251426 RD6X-00-012600 SV-251426r879559_rule Medium
Description
Redis Enterprise does not generate all the DoD-required audit records. This could lead to incomplete information as follows: - Without an audit trail, unauthorized access to protected data and attempts to elevate or restrict privileges could go undetected. - It would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. - Without the creation of certain audit logs, it would be difficult to identify attempted attacks, and an audit trail would not be available for some forensic investigation for after-the-fact actions. For a complete list of unsupported audit requirements, email "disa.letterkenny.re.mbx.stig-customer-support-mailbox@mail.mil". Once the identity of the requester has been verified and the specifics of missing audit requirements obtained, risk can be assessed and a determination made as to whether it is acceptable.
STIG Date
Redis Enterprise 6.x Security Technical Implementation Guide 2023-12-18

Details

Check Text ( C-54859r808341_chk )
This requirement is a permanent finding and cannot be fixed. Redis Enterprise does not currently support session or transactional auditing on the database.

Redis Enterprise does not generate all the DoD-required audit records; therefore this is a finding.

The site must seek AO or ISSO approval for use of Redis Enterprise 6.x with the understanding that not all of the DoD audit requirements are being met.
Fix Text (F-54814r806432_fix)
This requirement is a permanent finding and cannot be fixed.

This audit requirement must be continuously monitored.

It must be marked as an "open" finding to serve as a reminder to the AO and other stakeholders that this is an approved risk and needs to be reviewed periodically.