Skip to content

Oracle Database 11.2g Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • DBMS passwords must not be stored in compiled, encoded, or encrypted batch jobs or compiled, encoded, or encrypted application source code.

    Password maximum lifetime is the maximum period of time, (typically in days) a user's password may be in effect before the user is forced to change it. Passwords need to be changed at specific po...
    Rule Medium Severity
  • SRG-APP-000164-DB-000401

    Group
  • SRG-APP-000516-DB-000363

    Group
  • The DBMS must employ cryptographic mechanisms to protect the integrity and confidentiality of non-local maintenance and diagnostic communications.

    Non-local maintenance and diagnostic activities are those activities conducted by individuals communicating through a network, either an external network (e.g., the Internet) or an internal network...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    Group
  • The DBMS must employ strong identification and authentication techniques when establishing non-local maintenance and diagnostic sessions.

    Non-local maintenance and diagnostic activities are those activities conducted by individuals communicating through a network, either an external network (e.g., the Internet) or an internal network...
    Rule Medium Severity
  • SRG-APP-000295-DB-000305

    Group
  • The DBMS must terminate the network connection associated with a communications session at the end of the session or after 15 minutes of inactivity.

    Non-local maintenance and diagnostic activities are those activities conducted by individuals communicating through a network, either an external network (e.g., the Internet) or an internal network...
    Rule Medium Severity
  • SRG-APP-000179-DB-000114

    Group
  • SRG-APP-000516-DB-000363

    Group
  • Database data files containing sensitive information must be encrypted.

    Cryptography is only as strong as the encryption modules/algorithms employed to encrypt the data. Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to ...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    Group
  • The DBMS must automatically terminate emergency accounts after an organization-defined time period for each type of account.

    Emergency application accounts are typically created due to an unforeseen operational event or could ostensibly be used in the event of a vendor support visit where a support representative require...
    Rule Medium Severity
  • SRG-APP-000001-DB-000031

    Group
  • The DBMS must protect against or limit the effects of the organization-defined types of Denial of Service (DoS) attacks.

    A variety of technologies exist to limit, or in some cases, eliminate the effects of DoS attacks. For example, boundary protection devices can filter certain types of packets to protect devices on ...
    Rule Medium Severity
  • SRG-APP-000133-DB-000179

    Group
  • The DBMS must verify there have not been unauthorized changes to the DBMS software and information.

    Organizations are required to employ integrity verification applications on information systems to look for evidence of information tampering, errors, and omissions. The organization is also requir...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    Group
  • SRG-APP-000133-DB-000198

    Group
  • Use of the DBMS software installation account must be restricted.

    This requirement is intended to limit exposure due to operating from within a privileged account or role. The inclusion of role is intended to address those situations where an access control polic...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules