III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
Unauthorized database links must not be defined and active.
<VulnDiscussion>DBMS links provide a communication and data transfer path definition between two databases that may be used by malicious user...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
Sensitive information from production database exports must be modified before being imported into a development database.
<VulnDiscussion>Data export from production databases may include sensitive data. Application developers do not have a need to know to sensit...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
Only authorized system accounts must have the SYSTEM tablespace specified as the default tablespace.
<VulnDiscussion>The Oracle SYSTEM tablespace is used by the database to store all DBMS system objects. Other use of the system tablespace may...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
Application owner accounts must have a dedicated application tablespace.
<VulnDiscussion>Separation of tablespaces by application helps to protect the application from resource contention and unauthorized access th...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The directories assigned to the LOG_ARCHIVE_DEST* parameters must be protected from unauthorized access.
<VulnDiscussion>The LOG_ARCHIVE_DEST parameter is used to specify the directory to which Oracle archive logs are written. Where the DBMS avai...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The Oracle _TRACE_FILES_PUBLIC parameter if present must be set to FALSE.
<VulnDiscussion>The _TRACE_FILES_PUBLIC parameter is used to make trace files used for debugging database applications and events available t...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
Application object owner accounts must be disabled when not performing installation or maintenance actions.
<VulnDiscussion>Object ownership provides all database object permissions to the owned object. Access to the application object owner account...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
DBMS production application and data directories must be protected from developers on shared production/development DBMS host systems.
<VulnDiscussion>Developer roles should not be assigned DBMS administrative privileges to production DBMS application and data directories. Th...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
Use of the DBMS installation account must be logged.
<VulnDiscussion>The DBMS installation account may be used by any authorized user to perform DBMS installation or maintenance. Without logging...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The directory assigned to the AUDIT_FILE_DEST parameter must be protected from unauthorized access and must be stored in a dedicated directory or disk partition separate from software or other application files.
<VulnDiscussion>The AUDIT_FILE_DEST parameter specifies the directory where the database audit trail file is stored (when AUDIT_TRAIL paramet...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.