MYS8-00-003200 - The MySQL Database Server 8.0 must generate audit records when privileges/permissions are deleted

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Changes in the permissions, privileges, and roles granted to users and roles must be tracked. Without an audit trail, unauthorized elevation or restriction of individual and group privileges could go undetected. Elevated privileges give users access to information and functionality that they should not have; restricted privileges wrongly deny access to authorized users.

In an SQL environment, deleting permissions is typically done via the REVOKE or DENY command.

Solution

If currently required, configure the MySQL Database Server to produce audit records when privileges/permissions are deleted.

See the supplemental file 'MySQL80Audit.sql'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_MySQL_8-0_V1R4_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000172, Rule-ID|SV-235119r879870_rule, STIG-ID|MYS8-00-003200, Vuln-ID|V-235119

Plugin: MySQLDB

Control ID: e3812680b6e215ddf3add1202976e4933e27d0e8ba24eef778dc436d9dafcf39