Skip to content

IDMS must restrict the use of code that provides elevated privileges to specific instances.

An XCCDF Rule

Description

When a user has elevated privileges, they may be able to deliberately or inadvertently make alterations to the DBMS structure or data.

ID
SV-251639r961359_rule
Version
IDMS-DB-000690
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Determine where, when, how, and by what principals/subjects elevated privilege is needed.

Modify the database and DBMS security configuration (in SRTT and external security manager [ESM]), DBMS internal logic, external modules invoked by the DBMS, and the application(s) using the database, to ensure privilege elevation is used only as required.