![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.150466 |
Categoría: | Policy |
Título: | GaussDB Kernel: Enabling the Separation of Duties |
Resumen: | If the parameter enableSeparationOfDuty is set to on, the separation of duties is;enabled to control system administrator permissions. In this mode, system;administrators cannot create or modify user configurations or access data in;private users' schemas. In this way, system administrators' access to private data is;controlled. You are advised to disable the GUC parameter;enable_copy_server_files to control the COPY permission of the system;administrator, preventing the system administrator from reading or modifying the;user configuration file using the copy command.;For details about the separation of duties, see the Administrator Guide. |
Descripción: | Summary: If the parameter enableSeparationOfDuty is set to on, the separation of duties is enabled to control system administrator permissions. In this mode, system administrators cannot create or modify user configurations or access data in private users' schemas. In this way, system administrators' access to private data is controlled. You are advised to disable the GUC parameter enable_copy_server_files to control the COPY permission of the system administrator, preventing the system administrator from reading or modifying the user configuration file using the copy command. For details about the separation of duties, see the Administrator Guide. CVSS Score: 0.0 CVSS Vector: AV:L/AC:H/Au:S/C:N/I:N/A:N |
Copyright | Copyright (C) 2020 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |