STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to MariaDB Enterprise 10.x Security Technical Implementation Guide

V-253667

CAT I (High)

MariaDB must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principals.

Rule ID

SV-253667r1136896_rule

STIG

MariaDB Enterprise 10.x Security Technical Implementation Guide

Version

V2R5

CCIs

CCI-000015

Discussion

Enterprise environments make account management for applications and databases challenging and complex. A manual process for account management functions adds the risk of a potential oversight or other error. Managing accounts for the same person in multiple places is inefficient and prone to problems with consistency and synchronization. A comprehensive application account management process that includes automation helps to ensure that accounts designated as requiring attention are consistently and promptly addressed. Examples include, but are not limited to, using automation to take action on multiple accounts designated as inactive, suspended, or terminated, or disabling accounts located in noncentralized account stores, such as multiple servers. Account management functions can also include assignment of group or role membership; identifying account type; specifying user access authorizations (i.e., privileges); account removal, update, or termination; and administrative alerts. The use of automated mechanisms can include, for example, using email or text messaging to notify account managers when users are terminated or transferred, using the information system to monitor account usage, and using automated telephone notification to report atypical system account usage. MariaDB must be configured to automatically utilize organization-level account management functions, and these functions must immediately enforce the organization's current account policy. Automation may comprise differing technologies that when placed together contain an overall mechanism supporting an organization's automated account management requirements.

Check Content

If all accounts are authenticated by the organization-level authentication/access mechanism, such as LDAP, Kerberos, or Active Directory, and not by MariaDB, this is not a finding.

If any accounts are managed by the DBMS, review the system documentation for justification and approval of these accounts.

If any DBMS-managed accounts exist that are not documented and approved, this is a finding.

As the OS administrator, review the configuration in the /etc/pam.conf file or the /etc/pam.d directory. If there are no configuration file(s), this is a finding. 
Example for LDAP authentication and authorization via PAM would be /etc/pam.d/mariadb_ldap: 

#############################
auth         required     pam_ldap.so
account    required     pam_ldap.so
#############################

Verify that PAM is installed:

MariaDB> SHOW PLUGINS;

If pam is not listed as active, this is a finding.

To find users not using PAM plugin for authentication: 

MariaDB> SELECT user, host, plugin FROM mysql.user WHERE plugin != 'pam';

If any users are returned, this is a finding.

Fix Text

Integrate MariaDB security with an organization-level authentication/access mechanism providing account management for all users, groups, roles, and any other principals.

As the database administrator, install and configure the PAM authentication module:

MariaDB> INSTALL SONAME 'auth_pam';

PAM supports many authentication methods including LDAP, Active Directory, and Kerberos. Each method must be configured properly in the /etc/pam.conf file or the /etc/pam.d directory. 

To alter non-PAM authenticated users to using PAM:

MariaDB> ALTER USER 'username'@'host' IDENTIFIED VIA pam USING mariadb_ldap;