
MySQL Vulnerability Scanning Done Right
Looking for a reliable MySQL vulnerability scanning tool to help evaluate your Oracle MySQL server's security posture against DISA's Security Technical Implementation Guidelines (STIGs)?
ASSET for MySQL automates DISA's manual STIG checks against MySQL servers and produces STIG checklists in the required .xccdf 1.1 xml format, saving you hours—if not days—of tedious and error-prone manual labor. When you use ASSET to execute your MySQL STIG checks, it will:
- Quickly and reliably perform nearly ALL of the DISA mandated MySQL STIG vulnerability checks
- Automatically evaluate scan results, assigning the appropriate status (Not a Finding, Open, Not Applicable) where possible, and...
- Provide the information necessary to support that status, or facilitate any further review
- Include customizable Finding Details language based on scan results
- Output directly to a DISA MySQL STIG checklist. (No more copying and pasting the results from your own ad-hoc scripts into the checklists!)
- Perform both SQL and BASH checks
- Target multiple databases on a single MySQL server at once and automatically produce individual checklists for each one
- Supports Windows and SQL Authentication
Until DISA produces additional versions, these checks are applicable to all MySQL versions.
REQUIREMENTS
- Windows 64-bit Operating System with:
- .NET 4.5 or higher
- PowerShell 5 or higher
- Execution policy remotesigned
- PuTTY (with PLINK) installed
This is a one month subscription download - Single seat, single client access license (CAL). Expires 10/1/2025.
SAM.gov UEI: TYSCNN1FN7T6