Details
The cornerstone of the PKI is the private key used to encrypt or digitally sign information. The key by itself is a cryptographic value that does not contain specific user information.
When including the DBMS in the Private Key Infrastructure, the authenticated user must map directly to a user account in the DBMS. If the user account is not directly tied to the authenticated identity, there is no way to know which, if any, database user account has been authorized.
Solution
Configure the DBMS to map the authenticated identity directly to the DBMS user account.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Identification and Authentication.This control applies to the following type of system Unix.
References
- 800-53|IA-5(2)(c)
- CAT|II
- CCI|CCI-000187
- Rule-ID|SV-219776r397600_rule
- STIG-ID|O112-C2-015500
- STIG-Legacy|SV-66511
- STIG-Legacy|V-52295
- Vuln-ID|V-219776