The DBMS must disable accounts when the accounts have expired.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-263602SRG-APP-000700-DB-000100SV-263602r982479_ruleCCI-003627medium
Description
Disabling expired, inactive, or otherwise anomalous accounts supports the concepts of least privilege and least functionality, which reduce the attack surface of the system.
STIGDate
Database Security Requirements Guide2024-12-04

Details

Check Text (C-263602r982479_chk)

Verify the DBMS is configured to disable accounts when the accounts have expired. If the DBMS is not configured to disable accounts when the accounts have expired, this is a finding.

Fix Text (F-67410r981963_fix)

Configure the DBMS to disable accounts when the accounts have expired.