Network access to the DBMS must be restricted to authorized personnel.
An XCCDF Rule
Description
Restricting remote access to specific, trusted systems helps prevent access by unauthorized and potentially malicious users.
- ID
- SV-219738r879887_rule
- Version
- O112-BP-025600
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
Configure the database listener to restrict access by IP address or set up an external device to restrict network access to the DBMS.