Skip to content

Oracle Database 11.2g Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Fixed user and public database links must be authorized for use.

    Database links define connections that may be used by the local database to access remote Oracle databases. These links provide a means for a compromise to the local database to spread to remote da...
    Rule Medium Severity
  • A minimum of two Oracle control files must be defined and configured to be stored on separate, archived disks (physical or virtual) or archived partitions on a RAID device.

    Oracle control files are used to store information critical to Oracle database integrity. Oracle uses these files to maintain time synchronization of database files as well as at system startup to ...
    Rule Low Severity
  • Execute permission must be revoked from PUBLIC for restricted Oracle packages.

    Access to the following packages should be restricted to authorized accounts only. UTL_FILE: allows Oracle accounts to read and write files on the host operating system. UTL_SMTP: allows messages ...
    Rule Medium Severity
  • The Oracle SQL92_SECURITY parameter must be set to TRUE.

    The configuration option SQL92_SECURITY specifies whether table-level SELECT privileges are required to execute an update or delete that references table column values. If this option is disabled (...
    Rule Medium Severity
  • System Privileges must not be granted to PUBLIC.

    System privileges can be granted to users and roles and to the user group PUBLIC. All privileges granted to PUBLIC are accessible to every user in the database. Many of these privileges convey cons...
    Rule Medium Severity
  • Object permissions granted to PUBLIC must be restricted.

    Permissions on objects may be granted to the user group PUBLIC. Because every database user is a member of the PUBLIC group, granting object permissions to PUBLIC gives all users in the database ac...
    Rule Medium Severity
  • Unauthorized database links must not be defined and active.

    DBMS links provide a communication and data transfer path definition between two databases that may be used by malicious users to discover and obtain unauthorized access to remote systems. Database...
    Rule Medium Severity
  • Application object owner accounts must be disabled when not performing installation or maintenance actions.

    Object ownership provides all database object permissions to the owned object. Access to the application object owner accounts requires special protection to prevent unauthorized access and use of ...
    Rule Medium Severity
  • Network access to the DBMS must be restricted to authorized personnel.

    Restricting remote access to specific, trusted systems helps prevent access by unauthorized and potentially malicious users.
    Rule Medium Severity
  • Changes to configuration options must be audited.

    The AUDIT_SYS_OPERATIONS parameter is used to enable auditing of actions taken by the user SYS. The SYS user account is a shared account by definition and holds all privileges in the Oracle databas...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules