Details
Restricting remote access to specific, trusted systems helps prevent access by unauthorized and potentially malicious users.
Solution
Configure the database listener to restrict access by IP address or set up an external device to restrict network access to the DBMS.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Configuration Management.This control applies to the following type of system Unix.
References
- 800-53|CM-6b.
- CAT|II
- CCI|CCI-000366
- Rule-ID|SV-219738r401224_rule
- STIG-ID|O112-BP-025600
- STIG-Legacy|SV-68287
- STIG-Legacy|V-54047
- Vuln-ID|V-219738
Comments
Please sign in to leave a comment.