V-206522
CAT IIThe DBMS must protect against a user falsely repudiating having performed organization-defined actions.
- Ships Affected
- 1
- Total Findings
- 1
- Open
- 0
- Closed
- 0
Check Text
Review system documentation to determine the data and the actions on data that need to be protected from repudiation by means of audit trails.
Review DBMS settings to determine whether users can be identified as individuals when using shared accounts. If the individual user who is using a shared account cannot be identified, this is a finding.
Review the design and the contents of the application data tables. If they do not include the necessary audit data, this is a finding.
Review the configuration of audit logs to determine whether auditing includes details identifying the individual user. If it does not, this is a finding.
Fix Text
Use accounts assigned to individual users. Where the application connects to the DBMS using a standard, shared account, ensure that it also captures the individual user identification and passes it to the DBMS.
Modify application database tables and all supporting code to capture the necessary audit data.
Modify the configuration of audit logs to include details identifying the individual user.
STIG Reference
- STIG
- Database Security Requirements Guide
- Version
- 4
- Release
- 5
- Rule ID
- SV-206522r960864_rule
All Occurrences
This vulnerability appears on 1 ship(s)
| Ship | Hull # | Source File | Status | Assigned To | Scan Date | Actions |
|---|---|---|---|---|---|---|
| USNS MONTFORD POINT | T-ESD-1 | Montford Point ShipCLIP DB V4R4.ckl | Unassigned | 2026-03-06T12:50:21.809591 | View in Context |