No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000164-DB-000401
<GroupDescription></GroupDescription>Group -
The DBMS must support organizational requirements to enforce password complexity by the number of special characters used.
<VulnDiscussion>Password complexity or strength is a measure of the effectiveness of a password in resisting attempts at guessing and brute-f...Rule Medium Severity -
SRG-APP-000164-DB-000401
<GroupDescription></GroupDescription>Group -
The DBMS must support organizational requirements to enforce the number of characters that get changed when passwords are changed.
<VulnDiscussion>Passwords need to be changed at specific policy-based intervals. If the information system or application allows the user to...Rule Medium Severity -
SRG-APP-000164-DB-000401
<GroupDescription></GroupDescription>Group -
Procedures for establishing temporary passwords that meet DoD password requirements for new accounts must be defined, documented, and implemented.
<VulnDiscussion>Password maximum lifetime is the maximum period of time, (typically in days) a user's password may be in effect before the u...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
DBMS passwords must not be stored in compiled, encoded, or encrypted batch jobs or compiled, encoded, or encrypted application source code.
<VulnDiscussion>Password maximum lifetime is the maximum period of time, (typically in days) a user's password may be in effect before the u...Rule Medium Severity -
SRG-APP-000164-DB-000401
<GroupDescription></GroupDescription>Group -
The DBMS must enforce password maximum lifetime restrictions.
<VulnDiscussion>Password maximum lifetime is the maximum period of time, (typically in days) a user's password may be in effect before the us...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The DBMS must employ cryptographic mechanisms to protect the integrity and confidentiality of non-local maintenance and diagnostic communications.
<VulnDiscussion>Non-local maintenance and diagnostic activities are those activities conducted by individuals communicating through a network...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The DBMS must employ strong identification and authentication techniques when establishing non-local maintenance and diagnostic sessions.
<VulnDiscussion>Non-local maintenance and diagnostic activities are those activities conducted by individuals communicating through a network...Rule Medium Severity -
SRG-APP-000295-DB-000305
<GroupDescription></GroupDescription>Group -
The DBMS must terminate the network connection associated with a communications session at the end of the session or after 15 minutes of inactivity.
<VulnDiscussion>Non-local maintenance and diagnostic activities are those activities conducted by individuals communicating through a network...Rule Medium Severity -
SRG-APP-000179-DB-000114
<GroupDescription></GroupDescription>Group -
The DBMS must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
<VulnDiscussion>Use of cryptography to provide confidentiality and non-repudiation is not effective unless strong methods are employed. Many ...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
Database data files containing sensitive information must be encrypted.
<VulnDiscussion>Cryptography is only as strong as the encryption modules/algorithms employed to encrypt the data. Use of weak or untested e...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The DBMS must automatically terminate emergency accounts after an organization-defined time period for each type of account.
<VulnDiscussion>Emergency application accounts are typically created due to an unforeseen operational event or could ostensibly be used in th...Rule Medium Severity -
SRG-APP-000001-DB-000031
<GroupDescription></GroupDescription>Group -
The DBMS must protect against or limit the effects of the organization-defined types of Denial of Service (DoS) attacks.
<VulnDiscussion>A variety of technologies exist to limit, or in some cases, eliminate the effects of DoS attacks. For example, boundary prote...Rule Medium Severity -
SRG-APP-000133-DB-000179
<GroupDescription></GroupDescription>Group -
The DBMS must verify there have not been unauthorized changes to the DBMS software and information.
<VulnDiscussion>Organizations are required to employ integrity verification applications on information systems to look for evidence of infor...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The DBMS must support taking organization-defined list of least disruptive actions to terminate suspicious events.
<VulnDiscussion>System availability is a key tenet of system security. Organizations need to have the flexibility to be able to define the au...Rule Medium Severity -
SRG-APP-000133-DB-000198
<GroupDescription></GroupDescription>Group -
Use of the DBMS software installation account must be restricted.
<VulnDiscussion>This requirement is intended to limit exposure due to operating from within a privileged account or role. The inclusion of ro...Rule Medium Severity -
SRG-APP-000133-DB-000179
<GroupDescription></GroupDescription>Group -
The OS must limit privileges to change the DBMS software resident within software libraries (including privileged programs).
<VulnDiscussion>When dealing with change control issues, it should be noted, any changes to the hardware, software, and/or firmware component...Rule Medium Severity -
SRG-APP-000456-DB-000400
<GroupDescription></GroupDescription>Group -
Oracle database products must be a version supported by the vendor.
<VulnDiscussion>Unsupported commercial and database systems should not be used because fixes to newly identified bugs will not be implemented...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.