III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
DBMS default accounts must be assigned custom passwords.
<VulnDiscussion>Password maximum lifetime is the maximum period of time, (typically in days) a user's password may be in effect before the u...Rule High Severity -
SRG-APP-000441-DB-000378
<GroupDescription></GroupDescription>Group -
The DBMS must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission unless the transmitted data is otherwise protected by alternative physical measures.
<VulnDiscussion>Preventing the disclosure of transmitted information requires that applications take measures to employ some form of cryptogr...Rule High Severity -
SRG-APP-000142-DB-000094
<GroupDescription></GroupDescription>Group -
The DBMS must support the disabling of network protocols deemed by the organization to be nonsecure.
<VulnDiscussion>This requirement is related to remote access, but more specifically to the networking protocols allowing systems to communica...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The DBMS must provide a mechanism to automatically identify accounts designated as temporary or emergency accounts.
<VulnDiscussion>Temporary application accounts could be used in the event of a vendor support visit where a support representative requires a...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The DBMS must provide a mechanism to automatically remove or disable temporary user accounts after 72 hours.
<VulnDiscussion>Temporary application accounts could ostensibly be used in the event of a vendor support visit where a support representative...Rule Medium Severity -
SRG-APP-000328-DB-000301
<GroupDescription></GroupDescription>Group -
The DBMS must enforce Discretionary Access Control (DAC) policy allowing users to specify and control sharing by named individuals, groups of individuals, or by both, limiting propagation of access rights and including or excluding access to the granularity of a single user.
<VulnDiscussion>Access control policies (e.g., identity-based policies, role-based policies, attribute-based policies) and access enforcement...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
A single database connection configuration file must not be used to configure all database clients.
<VulnDiscussion>Applications employ the concept of least privilege for specific duties and information systems (including specific functions,...Rule Medium Severity -
SRG-APP-000133-DB-000362
<GroupDescription></GroupDescription>Group -
The DBMS must be protected from unauthorized access by developers.
<VulnDiscussion>Applications employ the concept of least privilege for specific duties and information systems (including specific functions,...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The DBMS must be protected from unauthorized access by developers on shared production/development host systems.
<VulnDiscussion>Applications employ the concept of least privilege for specific duties and information systems (including specific functions,...Rule Medium Severity -
SRG-APP-000243-DB-000374
<GroupDescription></GroupDescription>Group -
The DBMS must restrict access to system tables and other configuration information or metadata to DBAs or other authorized users.
<VulnDiscussion>Applications employ the concept of least privilege for specific duties and information systems (including specific functions,...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.