STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Database Security Requirements Guide

V-206638

CAT II (Medium)

The DBMS must generate audit records for all direct access to the database(s).

Rule ID

SV-206638r961839_rule

STIG

Database Security Requirements Guide

Version

V4R5

CCIs

CCI-000172

Discussion

In this context, direct access is any query, command, or call to the DBMS that comes from any source other than the application(s) that it supports. Examples would be the command line or a database management utility program. The intent is to capture all activity from administrative and non-standard sources.

Check Content

If the DBMS does not generate audit records for all direct access to the database(s), this is a finding.

Fix Text

Configure the DBMS to generate audit records for all direct access to the database(s).