Oracle Database 12c Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
Access to default accounts used to support replication must be restricted to authorized DBAs.
<VulnDiscussion>Replication database accounts are used for database connections between databases. Replication requires the configuration of ...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
Oracle instance names must not contain Oracle version numbers.
<VulnDiscussion>Service names may be discovered by unauthenticated users. If the service name includes version numbers or other database prod...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
Fixed user and public database links must be authorized for use.
<VulnDiscussion>Database links define connections that may be used by the local database to access remote Oracle databases. These links provi...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
A minimum of two Oracle redo log groups/files must be defined and configured to be stored on separate, archived physical disks or archived directories on a RAID device.
<VulnDiscussion>The Oracle redo log files store the detailed information on changes made to the database. This information is critical to dat...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
A minimum of two Oracle control files must be defined and configured to be stored on separate, archived disks (physical or virtual) or archived partitions on a RAID device.
<VulnDiscussion>Oracle control files are used to store information critical to Oracle database integrity. Oracle uses these files to maintain...Rule Low Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The Oracle WITH GRANT OPTION privilege must not be granted to non-DBA or non-Application administrator user accounts.
<VulnDiscussion>An account permission to grant privileges within the database is an administrative function. Minimizing the number and privil...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The Oracle REMOTE_OS_AUTHENT parameter must be set to FALSE.
<VulnDiscussion>Setting this value to TRUE allows operating system authentication over an unsecured connection. Trusting remote operating sys...Rule High Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The Oracle REMOTE_OS_ROLES parameter must be set to FALSE.
<VulnDiscussion>Setting REMOTE_OS_ROLES to TRUE allows operating system groups to control Oracle roles. The default value of FALSE causes rol...Rule High Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The Oracle SQL92_SECURITY parameter must be set to TRUE.
<VulnDiscussion>The configuration option SQL92_SECURITY specifies whether table-level SELECT privileges are required to execute an update or ...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The Oracle password file ownership and permissions should be limited and the REMOTE_LOGIN_PASSWORDFILE parameter must be set to EXCLUSIVE or NONE.
<VulnDiscussion>It is critically important to the security of your system that you protect your password file and the environment variables t...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
System privileges granted using the WITH ADMIN OPTION must not be granted to unauthorized user accounts.
<VulnDiscussion>The WITH ADMIN OPTION allows the grantee to grant a privilege to another database account. Best security practice restricts t...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
System Privileges must not be granted to PUBLIC.
<VulnDiscussion>System privileges can be granted to users and roles and to the user group PUBLIC. All privileges granted to PUBLIC are access...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
Oracle roles granted using the WITH ADMIN OPTION must not be granted to unauthorized accounts.
<VulnDiscussion>The WITH ADMIN OPTION allows the grantee to grant a role to another database account. Best security practice restricts the pr...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
Object permissions granted to PUBLIC must be restricted.
<VulnDiscussion>Permissions on objects may be granted to the user group PUBLIC. Because every database user is a member of the PUBLIC group, ...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The Oracle Listener must be configured to require administration authentication.
<VulnDiscussion>Oracle listener authentication helps prevent unauthorized administration of the Oracle listener. Unauthorized administration ...Rule High Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
Application role permissions must not be assigned to the Oracle PUBLIC role.
<VulnDiscussion>Permissions granted to PUBLIC are granted to all users of the database. Custom roles must be used to assign application permi...Rule Medium Severity -
Oracle application administration roles must be disabled if not required and authorized.
<VulnDiscussion>Application administration roles, which are assigned system or elevated application object privileges, must be protected from...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
Connections by mid-tier web and application systems to the Oracle DBMS from a DMZ or external network must be encrypted.
<VulnDiscussion>Multi-tier systems may be configured with the database and connecting middle-tier system located on an internal network, with...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
Database job/batch queues must be reviewed regularly to detect unauthorized database job submissions.
<VulnDiscussion>Unauthorized users may bypass security mechanisms by submitting jobs to job queues managed by the database to be run under a ...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
Unauthorized database links must not be defined and active.
<VulnDiscussion>DBMS links provide a communication and data transfer path definition between two databases that may be used by malicious user...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
Sensitive information from production database exports must be modified before import to a development database.
<VulnDiscussion>Data export from production databases may include sensitive data. Application developers do not have a need to know to sensit...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
Only authorized system accounts must have the SYSTEM tablespace specified as the default tablespace.
<VulnDiscussion>The Oracle SYSTEM tablespace is used by the database to store all DBMS system objects. Other use of the system tablespace may...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
Application owner accounts must have a dedicated application tablespace.
<VulnDiscussion>Separation of tablespaces by application helps to protect the application from resource contention and unauthorized access th...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The directories assigned to the LOG_ARCHIVE_DEST* parameters must be protected from unauthorized access.
<VulnDiscussion>The LOG_ARCHIVE_DEST parameter is used to specify the directory to which Oracle archive logs are written. Where the DBMS avai...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The Oracle _TRACE_FILES_PUBLIC parameter if present must be set to FALSE.
<VulnDiscussion>The _TRACE_FILES_PUBLIC parameter is used to make trace files used for debugging database applications and events available t...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.