Details
DBMS systems that do not follow DoD, vendor and/or public best security practices are vulnerable to related published vulnerabilities. A DoD reference document such as a security technical implementation guide or security recommendation guide constitutes the primary source for security configuration or implementation guidance for the deployment of newly acquired IA- and IA-enabled IT products that require use of the product's IA capabilities.
NOTE: Please review the benchmark to ensure target compliance.
Solution
Apply available security guidance to the DBMS system.
If DoD security guidance is not available, the following are acceptable in descending order as available:
(1) Commercially accepted practices (e.g., SANS);
(2) Independent testing results (e.g., ICSA); or
(3) Vendor literature
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Unix.
References
- 800-53|CM-6b.
- CAT|II
- Rule-ID|SV-30742r1_rule
- STIG-ID|DG0007-ORACLE11
- Vuln-ID|V-6767
Comments
Please sign in to leave a comment.