Skip to content

Redis Enterprise 6.x Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000122-DB-000203

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must protect its audit configuration from unauthorized modification.

    &lt;VulnDiscussion&gt;Redis Enterprise does not come with unique tools to view log data and logging is not configurable. Logs are stored in a stand...
    Rule Medium Severity
  • SRG-APP-000123-DB-000204

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must protect its audit features from unauthorized removal.

    &lt;VulnDiscussion&gt;Redis Enterprise does not come with unique tools to view log data and logging is not configurable. Logs are stored in a stand...
    Rule Medium Severity
  • SRG-APP-000378-DB-000365

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.

    &lt;VulnDiscussion&gt;Redis Enterprise permits the installation of logic modules through a control plane layer to the database, which requires priv...
    Rule Medium Severity
  • SRG-APP-000380-DB-000360

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must enforce access restrictions associated with changes to the configuration of Redis Enterprise DBMS or database(s).

    &lt;VulnDiscussion&gt;Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the o...
    Rule Medium Severity
  • SRG-APP-000133-DB-000179

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must limit privileges to change software modules; to include stored procedures, functions, and triggers, and links to software external to Redis Enterprise DBMS.

    &lt;VulnDiscussion&gt;If the system were to allow any user to make changes to software libraries, those changes might be implemented without underg...
    Rule Medium Severity
  • SRG-APP-000133-DB-000198

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.

    &lt;VulnDiscussion&gt;Use of nonsecure network functions, ports, protocols, and services exposes the system to avoidable threats.&lt;/VulnDiscussio...
    Rule Medium Severity
  • SRG-APP-000141-DB-000091

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS software installation account must be restricted to authorized users.

    &lt;VulnDiscussion&gt;When dealing with change control issues, it should be noted any changes to the hardware, software, and/or firmware components...
    Rule Medium Severity
  • SRG-APP-000133-DB-000199

    <GroupDescription></GroupDescription>
    Group
  • Database software, including DBMS configuration files, must be stored in dedicated directories, or DASD pools, separate from the host OS and other applications.

    &lt;VulnDiscussion&gt;When dealing with change control issues, it should be noted any changes to the hardware, software, and/or firmware components...
    Rule Medium Severity
  • SRG-APP-000133-DB-000362

    <GroupDescription></GroupDescription>
    Group
  • The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to Redis Enterprise DBMS, etc.) must be restricted to authorized users.

    &lt;VulnDiscussion&gt;If the DBMS were to allow any user to make changes to database structure or logic, those changes might be implemented without...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Redis Enterprise DBMS must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.

    &lt;VulnDiscussion&gt;Configuring the DBMS to implement organization-wide security implementation guides and security checklists ensures compliance...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules