Skip to content

Oracle Database 12c Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • DBMS backup and restoration files must be protected from unauthorized access.

    Information system backup is a critical step in maintaining data assurance and availability. User-level information is data generated by information system and/or application users. In order to as...
    Rule Medium Severity
  • The DBMS must ensure users are authenticated with an individual authenticator prior to using a shared authenticator.

    To assure individual accountability and prevent unauthorized access, application users (and any processes acting on behalf of users) must be individually identified and authenticated. A shared aut...
    Rule Medium Severity
  • The DBMS must support organizational requirements to enforce minimum password length.

    Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. To meet password policy requirements, passwords need to...
    Rule Medium Severity
  • The DBMS must support organizational requirements to prohibit password reuse for the organization-defined number of generations.

    Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. To meet password policy requirements, passwords need to...
    Rule Medium Severity
  • The DBMS must support organizational requirements to enforce password complexity by the number of lowercase characters used.

    Password complexity or strength is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor of several that determi...
    Rule Medium Severity
  • The DBMS must support organizational requirements to enforce password complexity by the number of special characters used.

    Password complexity or strength is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password complexity is one factor of several that determi...
    Rule Medium Severity
  • The DBMS must support organizational requirements to enforce the number of characters that get changed when passwords are changed.

    Passwords need to be changed at specific policy-based intervals. If the information system or application allows the user to consecutively reuse extensive portions of their password when they chan...
    Rule Medium Severity
  • Procedures for establishing temporary passwords that meet DOD password requirements for new accounts must be defined, documented, and implemented.

    Password maximum lifetime is the maximum period of time, (typically in days) a user's password may be in effect before the user is forced to change it. Passwords need to be changed at specific po...
    Rule Medium Severity
  • DBMS passwords must not be stored in compiled, encoded, or encrypted batch jobs or compiled, encoded, or encrypted application source code.

    Password maximum lifetime is the maximum period of time, (typically in days) a user's password may be in effect before the user is forced to change it. Passwords need to be changed at specific po...
    Rule Medium Severity
  • The DBMS must terminate the network connection associated with a communications session at the end of the session or 15 minutes of inactivity.

    Non-local maintenance and diagnostic activities are those activities conducted by individuals communicating through a network, either an external network (e.g., the Internet) or an internal network...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules