I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000243-DB-000128
<GroupDescription></GroupDescription>Group -
The DBMS must prevent unauthorized and unintended information transfer via shared system resources.
<VulnDiscussion>The purpose of this control is to prevent information, including encrypted representations of information, produced by the ac...Rule Medium Severity -
SRG-APP-000251-DB-000160
<GroupDescription></GroupDescription>Group -
The DBMS must check the validity of data inputs.
<VulnDiscussion>Invalid user input occurs when a user inserts data or characters into an application's data entry fields and the application ...Rule Medium Severity -
SRG-APP-000266-DB-000162
<GroupDescription></GroupDescription>Group -
The DBMS must only generate error messages that provide information necessary for corrective actions without revealing organization-defined sensitive or potentially harmful information in error logs and administrative messages that could be exploited.
<VulnDiscussion>Any application providing too much information in error logs and in administrative messages to the screen risks compromising ...Rule Medium Severity -
SRG-APP-000267-DB-000163
<GroupDescription></GroupDescription>Group -
The DBMS must restrict error messages, so only authorized personnel may view them.
<VulnDiscussion>If the application provides too much information in error logs and administrative messages to the screen, this could lead to ...Rule Medium Severity -
SRG-APP-000178-DB-000083
<GroupDescription></GroupDescription>Group -
Applications must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
<VulnDiscussion>To prevent the compromise of authentication information, such as passwords, during the authentication process, the feedback f...Rule High Severity -
SRG-APP-000178-DB-000083
<GroupDescription></GroupDescription>Group -
When using command-line tools such as Oracle SQL*Plus, which can accept a plain-text password, users must use an alternative login method that does not expose the password.
<VulnDiscussion>The SRG states: "To prevent the compromise of authentication information, such as passwords, during the authentication proce...Rule High Severity -
SRG-APP-000109-DB-000049
<GroupDescription></GroupDescription>Group -
Disk space used by audit trail(s) must be monitored; audit records must be regularly or continuously offloaded to a centralized log management system.
<VulnDiscussion>It is critical when a system is at risk of failing to process audit logs as required; it detects and takes action to mitigate...Rule Medium Severity -
SRG-APP-000133-DB-000179
<GroupDescription></GroupDescription>Group -
Database software, applications, and configuration files must be monitored to discover unauthorized changes.
<VulnDiscussion>Any changes to the hardware, software, and/or firmware components of the information system and/or application can potentiall...Rule Medium Severity -
SRG-APP-000133-DB-000179
<GroupDescription></GroupDescription>Group -
Logic modules within the database (to include packages, procedures, functions and triggers) must be monitored to discover unauthorized changes.
<VulnDiscussion>Any changes to the hardware, software, and/or firmware components of the information system and/or application can potentiall...Rule Medium Severity -
SRG-APP-000133-DB-000198
<GroupDescription></GroupDescription>Group -
The DBMS software installation account must be restricted to authorized users.
<VulnDiscussion>When dealing with change control issues, it should be noted, any changes to the hardware, software, and/or firmware component...Rule Medium Severity -
SRG-APP-000133-DB-000199
<GroupDescription></GroupDescription>Group -
Database software directories, including DBMS configuration files, must be stored in dedicated directories, or DASD pools, separate from the host OS and other applications.
<VulnDiscussion>When dealing with change control issues, it should be noted, any changes to the hardware, software, and/or firmware component...Rule Medium Severity -
SRG-APP-000148-DB-000103
<GroupDescription></GroupDescription>Group -
The DBMS must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
<VulnDiscussion>To assure accountability and prevent unauthorized access, organizational users shall be identified and authenticated. Organ...Rule Medium Severity -
SRG-APP-000180-DB-000115
<GroupDescription></GroupDescription>Group -
The DBMS must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
<VulnDiscussion>Non-organizational users include all information system users other than organizational users which include organizational em...Rule Medium Severity -
SRG-APP-000211-DB-000122
<GroupDescription></GroupDescription>Group -
The DBMS must separate user functionality (including user interface services) from database management functionality.
<VulnDiscussion>Information system management functionality includes functions necessary to administer databases, network components, worksta...Rule Medium Severity -
SRG-APP-000080-DB-000063
<GroupDescription></GroupDescription>Group -
The DBMS must protect against an individual using a group account from falsely denying having performed a particular action.
<VulnDiscussion>Non-repudiation of actions taken is required in order to maintain application integrity. Examples of particular actions taken...Rule Low Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
DBA OS accounts must be granted only those host system privileges necessary for the administration of the DBMS.
<VulnDiscussion>This requirement is intended to limit exposure due to operating from within a privileged account or role. The inclusion of ro...Rule High Severity -
SRG-APP-000456-DB-000390
<GroupDescription></GroupDescription>Group -
Vendor-supported software must be evaluated and patched against newly found vulnerabilities.
<VulnDiscussion>Security faults with software applications and operating systems are discovered daily. Vendors are constantly updating and pa...Rule High Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
DBMS default accounts must be assigned custom passwords.
<VulnDiscussion>Password maximum lifetime is the maximum period of time, (typically in days) a user's password may be in effect before the u...Rule High Severity -
SRG-APP-000441-DB-000378
<GroupDescription></GroupDescription>Group -
The DBMS must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission unless the transmitted data is otherwise protected by alternative physical measures.
<VulnDiscussion>Preventing the disclosure of transmitted information requires that applications take measures to employ some form of cryptogr...Rule High Severity -
SRG-APP-000142-DB-000094
<GroupDescription></GroupDescription>Group -
The DBMS must support the disabling of network protocols deemed by the organization to be non-secure.
<VulnDiscussion>This requirement is related to remote access, but more specifically to the networking protocols allowing systems to communica...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The DBMS must provide a mechanism to automatically identify accounts designated as temporary or emergency accounts.
<VulnDiscussion>Temporary application accounts could be used in the event of a vendor support visit where a support representative requires a...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The DBMS must provide a mechanism to automatically terminate accounts designated as temporary or emergency accounts after an organization-defined time period.
<VulnDiscussion>Temporary application accounts could ostensibly be used in the event of a vendor support visit where a support representative...Rule Medium Severity -
SRG-APP-000328-DB-000301
<GroupDescription></GroupDescription>Group -
The DBMS must enforce Discretionary Access Control (DAC) policy allowing users to specify and control sharing by named individuals, groups of individuals, or by both, limiting propagation of access rights and includes or excludes access to the granularity of a single user.
<VulnDiscussion>Access control policies (e.g., identity-based policies, role-based policies, attribute-based policies) and access enforcement...Rule Medium Severity -
SRG-APP-000033-DB-000084
<GroupDescription></GroupDescription>Group -
The DBMS must restrict grants to sensitive information to authorized user roles.
<VulnDiscussion>Applications employ the concept of least privilege for specific duties and information systems (including specific functions,...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
A single database connection configuration file must not be used to configure all database clients.
<VulnDiscussion>Applications employ the concept of least privilege for specific duties and information systems (including specific functions,...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.