Skip to main content
CUI

Vulnerability V-206522

Back

V-206522

CAT II

The DBMS must protect against a user falsely repudiating having performed organization-defined actions.

Ships Affected
1
Total Findings
1
Open
0
Closed
0

Check Text

Review system documentation to determine the data and the actions on data that need to be protected from repudiation by means of audit trails. Review DBMS settings to determine whether users can be identified as individuals when using shared accounts. If the individual user who is using a shared account cannot be identified, this is a finding. Review the design and the contents of the application data tables. If they do not include the necessary audit data, this is a finding. Review the configuration of audit logs to determine whether auditing includes details identifying the individual user. If it does not, this is a finding.

Fix Text

Use accounts assigned to individual users. Where the application connects to the DBMS using a standard, shared account, ensure that it also captures the individual user identification and passes it to the DBMS. Modify application database tables and all supporting code to capture the necessary audit data. Modify the configuration of audit logs to include details identifying the individual user.

STIG Reference

STIG
Database Security Requirements Guide
Version
4
Release
5
Rule ID
SV-206522r960864_rule

All Occurrences

This vulnerability appears on 1 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
USNS MONTFORD POINT T-ESD-1 Montford Point ShipCLIP DB V4R4.ckl
Unassigned 2026-03-06T12:50:21.809591 View in Context
CUI