IDMS must restrict the use of code that provides elevated privileges to specific instances.
An XCCDF Rule
Description
When a user has elevated privileges, they may be able to deliberately or inadvertently make alterations to the DBMS structure or data.
- ID
- SV-251639r961359_rule
- Version
- IDMS-DB-000690
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
Determine where, when, how, and by what principals/subjects elevated privilege is needed.
Modify the database and DBMS security configuration (in SRTT and external security manager [ESM]), DBMS internal logic, external modules invoked by the DBMS, and the application(s) using the database, to ensure privilege elevation is used only as required.