Oracle Database 12c Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000141-DB-000091
<GroupDescription></GroupDescription>Group -
Unused database components, DBMS software, and database objects must be removed.
<VulnDiscussion>Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, pr...Rule Medium Severity -
SRG-APP-000141-DB-000092
<GroupDescription></GroupDescription>Group -
Unused database components that are integrated in the DBMS and cannot be uninstalled must be disabled.
<VulnDiscussion>Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, pr...Rule Medium Severity -
SRG-APP-000141-DB-000093
<GroupDescription></GroupDescription>Group -
Use of external executables must be authorized.
<VulnDiscussion>Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, pr...Rule Medium Severity -
SRG-APP-000141-DB-000093
<GroupDescription></GroupDescription>Group -
Access to external executables must be disabled or restricted.
<VulnDiscussion>The Oracle external procedure capability provides use of the Oracle process account outside the operation of the DBMS process...Rule Medium Severity -
SRG-APP-000142-DB-000094
<GroupDescription></GroupDescription>Group -
The DBMS must support the organizational requirements to specifically prohibit or restrict the use of unauthorized functions, ports, protocols, and/or services.
<VulnDiscussion>Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, pr...Rule Medium Severity -
SRG-APP-000171-DB-000074
<GroupDescription></GroupDescription>Group -
The DBMS must support organizational requirements to enforce password encryption for storage.
<VulnDiscussion>Applications must enforce password encryption when storing passwords. Passwords need to be protected at all times, and encryp...Rule High Severity -
SRG-APP-000175-DB-000067
<GroupDescription></GroupDescription>Group -
The DBMS, when utilizing PKI-based authentication, must validate certificates by constructing a certification path with status information to an accepted trust anchor.
<VulnDiscussion>A trust anchor is an authoritative entity represented via a public key and associated data. It is used in the context of publ...Rule Medium Severity -
SRG-APP-000177-DB-000069
<GroupDescription></GroupDescription>Group -
Processes (services, applications, etc.) that connect to the DBMS independently of individual users, must use valid, current DoD approved PKI certificates for authentication to the DBMS.
<VulnDiscussion>Just as individual users must be authenticated, and just as they must use PKI-based authentication, so must any processes tha...Rule Medium Severity -
SRG-APP-000179-DB-000114
<GroupDescription></GroupDescription>Group -
The DBMS must use NIST-validated FIPS 140-2 or 140-3 compliant cryptography for authentication mechanisms.
<VulnDiscussion>Use of weak or not validated cryptographic algorithms undermines the purposes of utilizing encryption and digital signatures ...Rule High Severity -
SRG-APP-000220-DB-000149
<GroupDescription></GroupDescription>Group -
The DBMS must terminate user sessions upon user logoff or any other organization or policy-defined session termination events, such as idle time limit exceeded.
<VulnDiscussion>This requirement focuses on communications protection at the application session, versus network packet, level. Session IDs ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.