Check: MADB-10-003750
MariaDB Enterprise 10.x STIG:
MADB-10-003750
(in versions v1 r3 through v1 r2)
Title
If MariaDB authentication using passwords is employed, MariaDB must enforce the DoD standards for password lifetime. (Cat II impact)
Discussion
OS/enterprise authentication and identification must be used (SRG-APP-000023-DB-000001). Native MariaDB authentication may be used only when circumstances make it unavoidable and must be documented and AO-approved. The DoD standard for authentication is DoD-approved PKI certificates. Authentication based on User ID and Password may be used only when it is not possible to employ a PKI certificate and requires AO approval. In such cases, the DoD standards for password complexity and lifetime must be implemented. DBMS products that can inherit the rules for these from the operating system or access control program (e.g., Microsoft Active Directory) must be configured to do so. For MariaDB, the rules must be enforced using available configuration parameters or custom code.
Check Content
Check the default password lifetime variable to verify it matches the password requirement. MariaDB> SHOW GLOBAL VARIABLES LIKE 'default_password_lifetime%'; If the value returned is not 60 or less, this is a finding.
Fix Text
Locate the MariaDB Enterprise Server configuration file (mariadb-enterprise.cnf) that contains the password variables within /etc/my.cnf.d/. Edit the variables. Example: default_password_lifetime = 60
Additional Identifiers
Rule ID: SV-253696r879601_rule
Vulnerability ID: V-253696
Group Title: SRG-APP-000164-DB-000401
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000192 |
The information system enforces password complexity by the minimum number of upper case characters used. |
Controls
Number | Title |
---|---|
IA-5 (1) |
Password-Based Authentication |