I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000133-DB-000199
<GroupDescription></GroupDescription>Group -
Database software, including MySQL Database Server 8.0 configuration files, must be stored in dedicated directories, or DASD pools (remove), separate from the host OS and other applications.
<VulnDiscussion>When dealing with change control issues, it should be noted any changes to the hardware, software, and/or firmware components...Rule Medium Severity -
SRG-APP-000133-DB-000362
<GroupDescription></GroupDescription>Group -
The role(s)/group(s) used to modify database structure (including but not necessarily limited to tables, indexes, storage, etc.) and logic modules (stored procedures, functions, triggers, links to software external to the MySQL Database Server 8.0, etc.) must be restricted to authorized users.
<VulnDiscussion>If the DBMS were to allow any user to make changes to database structure or logic, then those changes might be implemented wi...Rule Medium Severity -
SRG-APP-000383-DB-000364
<GroupDescription></GroupDescription>Group -
The MySQL Database Server 8.0 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.
<VulnDiscussion>Use of nonsecure network functions, ports, protocols, and services exposes the system to avoidable threats.</VulnDiscussio...Rule Medium Severity -
SRG-APP-000378-DB-000365
<GroupDescription></GroupDescription>Group -
The MySQL Database Server 8.0 must prohibit user installation of logic modules (stored procedures, functions, triggers, views, etc.) without explicit privileged status.
<VulnDiscussion>Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malici...Rule Medium Severity -
SRG-APP-000380-DB-000360
<GroupDescription></GroupDescription>Group -
The MySQL Database Server 8.0 must enforce access restrictions associated with changes to the configuration of the MySQL Database Server 8.0 or database(s).
<VulnDiscussion>Failure to provide logical access restrictions associated with changes to configuration may have significant effects on the o...Rule Medium Severity -
SRG-APP-000381-DB-000361
<GroupDescription></GroupDescription>Group -
The MySQL Database Server 8.0 must produce audit records of its enforcement of access restrictions associated with changes to the configuration of the MySQL Database Server 8.0 or database(s).
<VulnDiscussion>Without auditing the enforcement of access restrictions against changes to configuration, it would be difficult to identify a...Rule Medium Severity -
SRG-APP-000356-DB-000314
<GroupDescription></GroupDescription>Group -
The MySQL Database Server 8.0 must utilize centralized management of the content captured in audit records generated by all components of the MySQL Database Server 8.0.
<VulnDiscussion>The content captured in audit records must be managed from a central location (necessitating automation). Centralized managem...Rule Medium Severity -
SRG-APP-000356-DB-000315
<GroupDescription></GroupDescription>Group -
The MySQL Database Server 8.0 must provide centralized configuration of the content to be captured in audit records generated by all components of the MySQL Database Server 8.0.
<VulnDiscussion>If the configuration of the Database Management System's (DBMS's) auditing is spread across multiple locations in the databas...Rule Medium Severity -
SRG-APP-000357-DB-000316
<GroupDescription></GroupDescription>Group -
The MySQL Database Server 8.0 must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
<VulnDiscussion>To ensure sufficient storage capacity for the audit logs, the Database Management System (DBMS) must be able to allocate audi...Rule Medium Severity -
SRG-APP-000515-DB-000318
<GroupDescription></GroupDescription>Group -
The MySQL Database Server 8.0 must off-load audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for stand-alone systems.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.