Skip to content

Network access to the DBMS must be restricted to authorized personnel.

An XCCDF Rule

Description

Restricting remote access to specific, trusted systems helps prevent access by unauthorized and potentially malicious users.

ID
SV-219738r879887_rule
Version
O112-BP-025600
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Configure the database listener to restrict access by IP address or set up an external device to restrict network access to the DBMS.