STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to DBN-6300 IDPS Security Technical Implementation Guide

V-237571

CAT II (Medium)

When implemented for discovery protection against unidentified or rogue databases, the DBN-6300 must provide a catalog of all visible databases and database services.

Rule ID

SV-237571r645541_rule

STIG

DBN-6300 IDPS Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000366

Discussion

If the DBN-6300 is installed incorrectly in the site's network architecture, vulnerable or unknown databases may not be detected and consequently may remain vulnerable and unprotected. For proper functionality of the DBN-6300, it is necessary to examine the discovered databases to see that an expected wide variety and number of them are covered. If the DBN-6300 is not able to see and detect database services, it will not be able to monitor the databases against threats.

Check Content

Ask the site representative if the DBN-6300 is used to provide discovery protection against unidentified or rogue databases. 
 
If the DBN-6300 is not used for discovery protection against unidentified or rogue databases, this is not a finding. 
 
Click on the "Database" tab and select the "Database Services" sub-menu. This will reveal all of the currently discovered database services. 
 
If the DBN-6300, which is used to provide protection against unidentified or rogue databases, does not provide a catalog of all visible databases and database services, this is a finding.

Fix Text

Configure the system to view databases and database services. 
 
Click on the Database >> Service Discovery tab. 
 
This will reveal all of the currently visible database services that have been seen on the mirrored traffic connection.