Review vendor documentation and vendor websites to identify vendor-provided demonstration or sample databases, database applications, objects, and files. Oracle MySQL 8.0 Security Technical Implementation Guideĭetails Check Text ( C-38362r623549_chk ) These demonstration and sample objects are meant to provide simple examples of coding specific functions and are not developed to prevent vulnerabilities from being introduced to the DBMS and host system. Examples include, but are not limited to, installing advertising software, demonstrations, or browser plugins not related to requirements or providing a wide array of functionality, not required for every mission, that cannot be disabled.ĭatabase Management Systems (DBMSs) must adhere to the principles of least functionality by providing only essential capabilities.ĭemonstration and sample database objects and applications present publicly known attack points for malicious users. It is detrimental for software products to provide, or install by default, functionality exceeding requirements or mission objectives. Some of the functions and services, provided by default, may not be necessary to support essential organizational operations (e.g., key missions, functions). Information systems are capable of providing a wide variety of functions and services.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |