Skip to main content
CUI

Vulnerability V-206642

Back

V-206642

CAT II

The DBMS must off-load audit data to a separate log management facility; this shall be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.

Ships Affected
1
Total Findings
1
Open
0
Closed
1

Check Text

Review the system documentation for a description of how audit records are off-loaded. If the DBMS has a continuous network connection to the centralized log management system, but the DBMS audit records are not written directly to the centralized log management system or transferred in near-real-time, this is a finding. If the DBMS does not have a continuous network connection to the centralized log management system, and the DBMS audit records are not transferred to the centralized log management system weekly or more often, this is a finding.

Fix Text

Configure the DBMS or deploy and configure software tools to transfer audit records to a centralized log management system, continuously and in near-real time where a continuous network connection to the log management system exists, or at least weekly in the absence of such a connection.

STIG Reference

STIG
Database Security Requirements Guide
Version
4
Release
5
Rule ID
SV-206642r961860_rule

All Occurrences

This vulnerability appears on 1 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
USNS MONTFORD POINT T-ESD-1 Montford Point ShipCLIP DB V4R4.ckl
Unassigned 2026-03-06T12:50:21.809591 View in Context
CUI