| Vuln ID | Severity | Asset | STIG | Title | Status | Doc Status | Assigned To | Actions |
|---|---|---|---|---|---|---|---|---|
| V-206573 | CAT II | MONT-DB-002 | Database Security Requirements Guide | The DBMS must prevent unauthorized and unintended ... | - | |||
Check TextReview the DBMS architecture to find out if and how it protects the private resources of one process or user (such as working memory, temporary tables, uncommitted data) from unauthorized access by another user or process. If it does not effectively do so, this is a finding. Fix TextDeploy a DBMS capable of effectively protecting the private resources of one process or user from unauthorized access by another user or process. Configure the DBMS to effectively protect the private resources of one process or user from unauthorized access by another user or process. CommentsDBMS is capable of effectively protecting the private resources of one process or user from unauthorized access by another user or process. DBMS is only directly accessible by privileged users on the server.
Source: Montford Point ShipCLIP DB V4R4.ckl
Scan Date: 2026-03-06T12:50:21.809591
Technology Area: Database Review
|
||||||||