Skip to content

The application must implement transaction recovery logs when transaction based.

An XCCDF Rule

Description

Without required logging and access control, security issues related to data changes will not be identified. This could lead to security compromises such as data misuse, unauthorized changes, or unauthorized access. Transaction logs contain a sequential record of all changes to the database. Using a transaction log helps with maintaining application availability and aids in speedy recovery. Transactional logging should be enabled whenever the application database offers the transactional logging capability.

ID
SV-222479r960909_rule
Version
APSC-DV-001040
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Configure the application database to utilize transactional logging.