Skip to main content
CUI

Vulnerability V-206527

Back

V-206527

CAT II

The DBMS must initiate session auditing upon startup.

Ships Affected
1
Total Findings
1
Open
0
Closed
1

Check Text

Review DBMS vendor documentation to determine whether the DBMS software is capable of session auditing. If the DBMS is not capable of session auditing and a third party product is not being used for session level auditing, this is a finding. If the DBMS is capable of session level auditing and specific session audits are currently defined but session auditing is not enabled; or if a third-party product is available for session auditing and specific session audits are currently defined but session auditing is not enabled, this is a finding.

Fix Text

Deploy a DBMS capable of session auditing. Configure the DBMS software or third-party product to enable session auditing.

STIG Reference

STIG
Database Security Requirements Guide
Version
4
Release
5
Rule ID
SV-206527r960888_rule

All Occurrences

This vulnerability appears on 1 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
USNS MONTFORD POINT T-ESD-1 Montford Point ShipCLIP DB V4R4.ckl
Unassigned 2026-03-06T12:50:21.809591 View in Context
CUI