Information
Remote administrative access to systems provides a path for access to and exploit of DBA privileges. Where the risk has been accepted to allow remote administrative access, it is imperative to instate increased monitoring of this access to detect any abuse or compromise.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
Solution
Develop, document and implement policy and procedures to monitor remote administrative access to the DBMS.
The automated generation of a log report with automatic dissemination to the IAO/IAM may be used.
Require and store an acknowledgement of receipt and confirmation of review for the log report.