Opened 12 years ago

#2304 new defect

CAT 2 V0002423 NAME: DBMS software and configuration file monitoring DESCRIPTION: Database software, applications and configuration files should be monitored to discover unauthorized changes.

Reported by: doconnor24 Owned by: ktia@…
Priority: highest Milestone: OMAR Dec 2012
Component: Algorithms/Functionality Version: ossim/OMAR 1.8.14-3
Severity: critical Keywords:
Cc:

Description

Develop, document and implement procedures to monitor for unauthorized changes to DBMS software libraries, related software application libraries and configuration files. If a third-party automated tool is not employed, an automated job that reports file information on the directories and files of interest and compares them to the baseline report for the same will meet the requirement. File hashes or checksums should be used for comparisons as file dates may be manipulated by malicious users.

Change History (0)

Note: See TracTickets for help on using tickets.