Skip to content

The DBMS must allow designated organizational personnel to select which auditable events are to be audited by the database.

An XCCDF Rule

Description

<VulnDiscussion>The list of audited events is the set of events for which audits are to be generated. This set of events is typically a subset of the list of all events for which the system is capable of generating audit records (i.e., auditable events, timestamps, source and destination addresses, user/process identifiers, event descriptions, success/fail indications, file names involved, and access control or flow control rules invoked). If the list of auditable events is not configurable, events that should be caught by auditing may be missed. This may allow malicious activity to be overlooked.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-219752r879560_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

Configure the DBMS's settings to allow designated personnel to select which auditable events are audited.

Note the following:
    In Oracle, any user can configure auditing for the objects in his or her own schema by using the AUDIT statement. To undo the audit configuration for an object, the user can use the NOAUDIT statement. No additional privileges are needed to perform this task.
    To audit objects in another schema, the user must have the AUDIT ANY system privilege.
    To audit system privileges, the user must have the AUDIT SYSTEM privilege.