Skip to content

The DBMS must be able to generate audit records when security objects are accessed.

An XCCDF Rule

Description

Changes to the security configuration must be tracked. This requirement applies to situations where security data is retrieved or modified via data manipulation operations, as opposed to via specialized security functionality. In an SQL environment, types of access include, but are not necessarily limited to: SELECT INSERT UPDATE DELETE EXECUTE

ID
SV-206612r961791_rule
Version
SRG-APP-000492-DB-000332
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Deploy a DBMS capable of producing the required audit records when security objects, such as tables, views, procedures, and functions, are accessed.

Configure the DBMS to produce audit records when security objects, such as tables, views, procedures, and functions, are accessed, to include reads, creations, modifications and deletions of data, and execution of logic.