No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000295-DB-000305
<GroupDescription></GroupDescription>Group -
MariaDB must automatically terminate a user's session after organization-defined conditions or trigger events requiring session disconnect.
<VulnDiscussion>This addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that ...Rule Medium Severity -
SRG-APP-000296-DB-000306
<GroupDescription></GroupDescription>Group -
MariaDB must provide logout functionality to allow the user to manually terminate a session initiated by that user.
<VulnDiscussion>If a user cannot explicitly end a DBMS session, the session may remain open and be exploited by an attacker; this is referred...Rule Medium Severity -
SRG-APP-000311-DB-000308
<GroupDescription></GroupDescription>Group -
MariaDB must associate organization-defined types of security labels having organization-defined security label values with information in storage.
<VulnDiscussion>Without the association of security labels to information, there is no basis for MariaDB to make security-related access-cont...Rule Medium Severity -
SRG-APP-000313-DB-000309
<GroupDescription></GroupDescription>Group -
MariaDB must associate organization-defined types of security labels having organization-defined security label values with information in process.
<VulnDiscussion>Without the association of security labels to information, there is no basis for MariaDB to make security-related access-cont...Rule Medium Severity -
SRG-APP-000314-DB-000310
<GroupDescription></GroupDescription>Group -
MariaDB must associate organization-defined types of security labels having organization-defined security label values with information in transmission.
<VulnDiscussion>Without the association of security labels to information, there is no basis for MariaDB to make security-related access-cont...Rule Medium Severity -
SRG-APP-000328-DB-000301
<GroupDescription></GroupDescription>Group -
MariaDB must enforce discretionary access control policies, as defined by the data owner, over defined subjects, and objects.
<VulnDiscussion>Discretionary Access Control (DAC) is based on the notion that individual users are owners of objects and therefore have disc...Rule Medium Severity -
SRG-APP-000340-DB-000304
<GroupDescription></GroupDescription>Group -
MariaDB must prevent nonprivileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
<VulnDiscussion>Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or proces...Rule Medium Severity -
SRG-APP-000342-DB-000302
<GroupDescription></GroupDescription>Group -
Execution of software modules (to include stored procedures, functions, and triggers) with elevated privileges must be restricted to necessary cases only.
<VulnDiscussion>In certain situations, to provide required functionality, MariaDB needs to execute internal logic (stored procedures, functio...Rule Medium Severity -
SRG-APP-000356-DB-000314
<GroupDescription></GroupDescription>Group -
MariaDB must utilize centralized management of the content captured in audit records generated by all components of the DBMS.
<VulnDiscussion>MariaDB can be configured to use syslog or any OS system file to store audit records to designated disk directories. Review...Rule Medium Severity -
SRG-APP-000356-DB-000315
<GroupDescription></GroupDescription>Group -
MariaDB must provide centralized configuration of the content to be captured in audit records generated by all components of the DBMS.
<VulnDiscussion>If the configuration of the DBMS's auditing is spread across multiple locations in the database management software, or acros...Rule Medium Severity -
SRG-APP-000357-DB-000316
<GroupDescription></GroupDescription>Group -
MariaDB must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
<VulnDiscussion>To ensure sufficient storage capacity for the audit logs, MariaDB must be able to allocate audit record storage capacity. Alt...Rule Medium Severity -
SRG-APP-000359-DB-000319
<GroupDescription></GroupDescription>Group -
MariaDB must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75 percent of maximum audit record storage capacity.
<VulnDiscussion>Organizations are required to use a central log management system, so, under normal conditions, the audit space allocated to ...Rule Medium Severity -
SRG-APP-000360-DB-000320
<GroupDescription></GroupDescription>Group -
MariaDB must provide an immediate real-time alert to appropriate support staff of all audit failure events requiring real-time alerts.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-APP-000374-DB-000322
<GroupDescription></GroupDescription>Group -
MariaDB must record time stamps, in audit records and application data, that can be mapped to Coordinated Universal Time (UTC, formerly GMT).
<VulnDiscussion>If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...Rule Medium Severity -
SRG-APP-000378-DB-000365
<GroupDescription></GroupDescription>Group -
MariaDB must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
<VulnDiscussion>Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malici...Rule Medium Severity -
SRG-APP-000380-DB-000360
<GroupDescription></GroupDescription>Group -
MariaDB must enforce access restrictions associated with changes to the configuration of MariaDB or database(s).
<VulnDiscussion>Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the o...Rule Medium Severity -
SRG-APP-000381-DB-000361
<GroupDescription></GroupDescription>Group -
MariaDB must produce audit records of its enforcement of access restrictions associated with changes to the configuration of the DBMS or database(s).
<VulnDiscussion>Without auditing the enforcement of access restrictions against changes to configuration, it would be difficult to identify a...Rule Medium Severity -
SRG-APP-000383-DB-000364
<GroupDescription></GroupDescription>Group -
MariaDB must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.
<VulnDiscussion>Use of nonsecure network functions, ports, protocols, and services exposes the system to avoidable threats.</VulnDiscussio...Rule Medium Severity -
SRG-APP-000389-DB-000372
<GroupDescription></GroupDescription>Group -
MariaDB must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
<VulnDiscussion>The DoD standard for authentication of an interactive user is the presentation of a Common Access Card (CAC) or other physica...Rule Medium Severity -
SRG-APP-000400-DB-000367
<GroupDescription></GroupDescription>Group -
MariaDB must prohibit the use of cached authenticators after an organization-defined time period.
<VulnDiscussion>If cached authentication information is out-of-date, the validity of the authentication information may be questionable. Eac...Rule Medium Severity -
SRG-APP-000416-DB-000380
<GroupDescription></GroupDescription>Group -
MariaDB must use NSA-approved cryptography to protect classified information in accordance with the data owner's requirements.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...Rule High Severity -
SRG-APP-000427-DB-000385
<GroupDescription></GroupDescription>Group -
MariaDB must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions.
<VulnDiscussion>Only DoD-approved external PKIs have been evaluated to ensure that they have security controls and identity vetting procedure...Rule Medium Severity -
SRG-APP-000428-DB-000386
<GroupDescription></GroupDescription>Group -
MariaDB must implement cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest (to include, at a minimum, PII and classified information) on organization-defined information system components.
<VulnDiscussion>MariaDB’s handling of data requiring data at rest protections must employ cryptographic mechanisms to prevent unauthorized di...Rule Medium Severity -
SRG-APP-000429-DB-000387
<GroupDescription></GroupDescription>Group -
MariaDB must implement cryptographic mechanisms preventing the unauthorized disclosure of organization-defined information at rest on organization-defined information system components.
<VulnDiscussion>MariaDB’s handling of data requiring data at rest protections must employ cryptographic mechanisms to prevent unauthorized di...Rule Medium Severity -
SRG-APP-000441-DB-000378
<GroupDescription></GroupDescription>Group -
MariaDB must maintain the confidentiality and integrity of information during preparation for transmission.
<VulnDiscussion>Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, including...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.