Database Security Requirements Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000220
<GroupDescription></GroupDescription>Group -
The DBMS must invalidate session identifiers upon user logout or other session termination.
<VulnDiscussion>Captured sessions can be reused in "replay" attacks. This requirement limits the ability of adversaries to capture and contin...Rule Medium Severity -
SRG-APP-000223
<GroupDescription></GroupDescription>Group -
The DBMS must recognize only system-generated session identifiers.
<VulnDiscussion>DBMSs utilize sessions and session identifiers to control application behavior and user access. If an attacker can guess the ...Rule Medium Severity -
SRG-APP-000224
<GroupDescription></GroupDescription>Group -
SRG-APP-000295
<GroupDescription></GroupDescription>Group -
The DBMS must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
<VulnDiscussion>Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. ...Rule Medium Severity -
SRG-APP-000226
<GroupDescription></GroupDescription>Group -
In the event of a system failure, the DBMS must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.
<VulnDiscussion>Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. F...Rule Medium Severity -
SRG-APP-000231
<GroupDescription></GroupDescription>Group -
The DBMS must protect the confidentiality and integrity of all information at rest.
<VulnDiscussion>This control is intended to address the confidentiality and integrity of information at rest in non-mobile devices and covers...Rule High Severity -
SRG-APP-000233
<GroupDescription></GroupDescription>Group -
The DBMS must isolate security functions from non-security functions.
<VulnDiscussion>An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform...Rule Medium Severity -
SRG-APP-000243
<GroupDescription></GroupDescription>Group -
SRG-APP-000400
<GroupDescription></GroupDescription>Group -
The DBMS must check the validity of all data inputs except those specifically identified by the organization.
<VulnDiscussion>Invalid user input occurs when a user inserts data or characters into an application's data entry fields and the application ...Rule Medium Severity -
SRG-APP-000251
<GroupDescription></GroupDescription>Group -
The DBMS and associated applications must reserve the use of dynamic code execution for situations that require it.
<VulnDiscussion>With respect to database management systems, one class of threat is known as SQL Injection, or more generally, code injection...Rule Medium Severity -
SRG-APP-000251
<GroupDescription></GroupDescription>Group -
The DBMS and associated applications, when making use of dynamic code execution, must scan input data for invalid values that may indicate a code injection attack.
<VulnDiscussion>With respect to database management systems, one class of threat is known as SQL Injection, or more generally, code injection...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.