STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← AC-23 — Data Mining Protection

CCI-002347

Definition

Employ organization-defined data mining detection techniques for organization-defined data storage objects to detect data mining attempts.

Parent Control

AC-23Data Mining ProtectionAccess Control

Linked STIG Checks (47)

V-237045CAT IITo protect against data mining, the A10 Networks ADC providing content filtering must detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.A10 Networks ADC ALG Security Technical Implementation GuideV-237046CAT IITo protect against data mining, the A10 Networks ADC providing content filtering must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.A10 Networks ADC ALG Security Technical Implementation GuideV-237047CAT IITo protect against data mining, the A10 Networks ADC providing content filtering as part of its intermediary services must detect code injection attacks launched against application objects including, at a minimum, application URLs and application code.A10 Networks ADC ALG Security Technical Implementation GuideV-76409CAT IITo protect against data mining, Kona Site Defender providing content filtering must detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.Akamai KSD Service Impact Level 2 ALG Security Technical Implementation GuideV-76411CAT IITo protect against data mining, Kona Site Defender providing content filtering must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.Akamai KSD Service Impact Level 2 ALG Security Technical Implementation GuideV-76413CAT IITo protect against data mining, Kona Site Defender providing content filtering as part of its intermediary services must detect code injection attacks launched against application objects including, at a minimum, application URLs and application code.Akamai KSD Service Impact Level 2 ALG Security Technical Implementation GuideV-204983CAT IITo protect against data mining, the ALG providing content filtering must detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.Application Layer Gateway Security Requirements GuideV-204984CAT IITo protect against data mining, the ALG providing content filtering must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.Application Layer Gateway Security Requirements GuideV-204985CAT IITo protect against data mining, the ALG providing content filtering as part of its intermediary services must detect code injection attacks launched against application objects including, at a minimum, application URLs and application code.Application Layer Gateway Security Requirements GuideV-222424CAT IIThe application must utilize organization-defined data mining detection techniques for organization-defined data storage objects to adequately detect data mining attempts.Application Security and Development Security Technical Implementation GuideV-237388CAT IITo protect against data mining, the CA API Gateway providing content filtering must detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.CA API Gateway ALG Security Technical Implementation GuideV-237389CAT IITo protect against data mining, the CA API Gateway providing content filtering must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.CA API Gateway ALG Security Technical Implementation GuideV-237390CAT IITo protect against data mining, the CA API Gateway providing content filtering as part of its intermediary services must detect code injection attacks launched against application objects including, at a minimum, application URLs and application code.CA API Gateway ALG Security Technical Implementation GuideV-237562CAT IITo protect against unauthorized data mining, the DBN-6300 must detect SQL code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.DBN-6300 IDPS Security Technical Implementation GuideV-237563CAT IITo protect against unauthorized data mining, the DBN-6300 must detect code injection attacks launched against application objects including, at a minimum, application URLs and application code/input fields.DBN-6300 IDPS Security Technical Implementation GuideV-237564CAT IITo protect against unauthorized data mining, the DBN-6300 must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.DBN-6300 IDPS Security Technical Implementation GuideV-214511CAT IITo protect against data mining, The BIG-IP ASM module must be configured to detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields when providing content filtering to virtual servers.F5 BIG-IP Application Security Manager Security Technical Implementation GuideV-214512CAT IITo protect against data mining, The BIG-IP ASM module must be configured to detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields when providing content filtering to virtual servers.F5 BIG-IP Application Security Manager Security Technical Implementation GuideV-214513CAT IIThe BIG-IP ASM module must be configured to detect code injection attacks launched against application objects including, at a minimum, application URLs and application code, when providing content filtering to virtual servers.F5 BIG-IP Application Security Manager Security Technical Implementation GuideV-215776CAT IITo protect against data mining, the BIG-IP Core implementation providing content filtering must be configured to detect code injection attacks being launched against data storage objects.F5 BIG-IP Local Traffic Manager Security Technical Implementation GuideV-215777CAT IITo protect against data mining, the BIG-IP Core implementation providing content filtering must be configured to detect SQL injection attacks being launched against data storage objects, including, at a minimum, databases, database records, and database fields.F5 BIG-IP Local Traffic Manager Security Technical Implementation GuideV-215778CAT IIThe BIG-IP Core implementation must be configured to detect code injection attacks being launched against application objects, including, at a minimum, application URLs and application code, when providing content filtering to virtual servers.F5 BIG-IP Local Traffic Manager Security Technical Implementation GuideV-266140CAT IITo protect against data mining, the F5 BIG-IP appliance providing content filtering must prevent code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.F5 BIG-IP TMOS ALG Security Technical Implementation GuideV-266141CAT IITo protect against data mining, the F5 BIG-IP appliance providing content filtering must prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.F5 BIG-IP TMOS ALG Security Technical Implementation GuideV-266142CAT IITo protect against data mining, the F5 BIG-IP appliance providing content filtering must prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.F5 BIG-IP TMOS ALG Security Technical Implementation GuideV-65249CAT IITo protect against data mining, the DataPower Gateway providing content filtering must detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.IBM DataPower ALG Security Technical Implementation GuideV-65251CAT IITo protect against data mining, the DataPower Gateway providing content filtering must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.IBM DataPower ALG Security Technical Implementation GuideV-65253CAT IITo protect against data mining, the DataPower Gateway providing content filtering as part of its intermediary services must detect code injection attacks launched against application objects including, at a minimum, application URLs and application code.IBM DataPower ALG Security Technical Implementation GuideV-55403CAT IITo protect against unauthorized data mining, the IDPS must detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.Intrusion Detection and Prevention Systems (IDPS) Security Requirements GuideV-55407CAT IITo protect against unauthorized data mining, the IDPS must detect code injection attacks launched against application objects including, at a minimum, application URLs and application code.Intrusion Detection and Prevention Systems (IDPS) Security Requirements GuideV-55409CAT IITo protect against unauthorized data mining, the IDPS must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.Intrusion Detection and Prevention Systems (IDPS) Security Requirements GuideV-206898CAT IITo protect against unauthorized data mining, the IDPS must detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.Intrusion Detection and Prevention Systems Security Requirements GuideV-206899CAT IITo protect against unauthorized data mining, the IDPS must detect code injection attacks launched against application objects including, at a minimum, application URLs and application code.Intrusion Detection and Prevention Systems Security Requirements GuideV-206900CAT IITo protect against unauthorized data mining, the IDPS must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.Intrusion Detection and Prevention Systems Security Requirements GuideV-66413CAT IITo protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.Juniper SRX SG IDPS Security Technical Implementation GuideV-66413CAT IITo protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.Juniper SRX SG IDPS Security Technical Implementation GuideV-66415CAT IITo protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must detect code injection attacks launched against application objects, including, at a minimum, application URLs and application code.Juniper SRX SG IDPS Security Technical Implementation GuideV-66415CAT IITo protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must detect code injection attacks launched against application objects, including, at a minimum, application URLs and application code.Juniper SRX SG IDPS Security Technical Implementation GuideV-66417CAT IITo protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.Juniper SRX SG IDPS Security Technical Implementation GuideV-66417CAT IITo protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.Juniper SRX SG IDPS Security Technical Implementation GuideV-214623CAT IITo protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.Juniper SRX Services Gateway IDPS Security Technical Implementation GuideV-214624CAT IITo protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must detect code injection attacks launched against application objects, including, at a minimum, application URLs and application code.Juniper SRX Services Gateway IDPS Security Technical Implementation GuideV-214625CAT IITo protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.Juniper SRX Services Gateway IDPS Security Technical Implementation GuideV-279203CAT IIThe Edge SWG must control remote access methods.Symantec Edge SWG ALG Security Technical Implementation GuideV-242170CAT IITo protect against unauthorized data mining, the TPS must detect code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.Trend Micro TippingPoint IDPS Security Technical Implementation GuideV-242171CAT IITo protect against unauthorized data mining, the TPS must detect code injection attacks launched against application objects including, at a minimum, application URLs and application code.Trend Micro TippingPoint IDPS Security Technical Implementation GuideV-242172CAT IITo protect against unauthorized data mining, the TPS must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.Trend Micro TippingPoint IDPS Security Technical Implementation Guide