Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000109-DB-000049

    Group
  • Unless it has been determined that availability is paramount, DB2 must, upon audit failure, cease all auditable activity.

    It is critical that when the DBMS is at risk of failing to process audit logs as required, it take action to mitigate the failure. Audit processing failures include: software/hardware errors; failu...
    Rule Medium Severity
  • SRG-APP-000118-DB-000059

    Group
  • The audit information produced by DB2 must be protected from unauthorized read access.

    If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is difficult, if not impossible, to achieve. In ...
    Rule Medium Severity
  • SRG-APP-000119-DB-000060

    Group
  • The audit information produced by DB2 must be protected from unauthorized modification.

    If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veraci...
    Rule Medium Severity
  • SRG-APP-000120-DB-000061

    Group
  • The audit information produced by DB2 must be protected from unauthorized deletion.

    If audit data were to become compromised, then competent forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracit...
    Rule Medium Severity
  • SRG-APP-000121-DB-000202

    Group
  • DB2 must protect its audit features from unauthorized access.

    Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Depending upon the log format and application, system and application log tools may ...
    Rule Medium Severity
  • SRG-APP-000122-DB-000203

    Group
  • DB2 must protect its audit configuration from unauthorized modification.

    Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on au...
    Rule Medium Severity
  • SRG-APP-000123-DB-000204

    Group
  • DB2 must protect its audit features from unauthorized removal.

    Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on au...
    Rule Medium Severity
  • SRG-APP-000133-DB-000179

    Group
  • DB2 must limit privileges to change software modules, to include stored procedures, functions and triggers, and links to software external to DB2.

    If the system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robus...
    Rule Medium Severity
  • SRG-APP-000133-DB-000179

    Group
  • The OS must limit privileges to change the DB2 software resident within software libraries (including privileged programs).

    If the system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robus...
    Rule Medium Severity
  • SRG-APP-000133-DB-000198

    Group
  • The DB2 software installation account must be restricted to authorized users.

    When dealing with change control issues, it should be noted any changes to the hardware, software, and/or firmware components of the information system and/or application can have significant effec...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules