Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Access to DBMS software files and directories must not be granted to unauthorized users.

    &lt;VulnDiscussion&gt;The DBMS software libraries contain the executables used by the DBMS to operate. Unauthorized access to the libraries can res...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Replication accounts must not be granted DBA privileges.

    &lt;VulnDiscussion&gt;Replication accounts may be used to access databases defined for the replication architecture. An exploit of a replication on...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Network access to the DBMS must be restricted to authorized personnel.

    &lt;VulnDiscussion&gt;Restricting remote access to specific, trusted systems helps prevent access by unauthorized and potentially malicious users.&...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Changes to configuration options must be audited.

    &lt;VulnDiscussion&gt;The AUDIT_SYS_OPERATIONS parameter is used to enable auditing of actions taken by the user SYS. The SYS user account is a sha...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Changes to DBMS security labels must be audited.

    &lt;VulnDiscussion&gt;Some DBMS systems provide the feature to assign security labels to data elements. If labeling is required, implementation opt...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Remote database or other external access must use fully-qualified names.

    &lt;VulnDiscussion&gt;The Oracle GLOBAL_NAMES parameter is used to set the requirement for database link names to be the same name as the remote da...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • The /diag subdirectory under the directory assigned to the DIAGNOSTIC_DEST parameter must be protected from unauthorized access.

    &lt;VulnDiscussion&gt;&lt;DIAGNOSTIC_DEST&gt;/diag indicates the directory where trace, alert, core and incident directories and files are located....
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Remote administration must be disabled for the Oracle connection manager.

    &lt;VulnDiscussion&gt;Remote administration provides a potential opportunity for malicious users to make unauthorized changes to the Connection Man...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • The SQLNet SQLNET.ALLOWED_LOGON_VERSION parameter must be set to a value of 12 or higher.

    &lt;VulnDiscussion&gt;Unsupported Oracle network client installations may introduce vulnerabilities to the database. Restriction to use of supporte...
    Rule Medium Severity
  • SRG-APP-000176-DB-000068

    <GroupDescription></GroupDescription>
    Group
  • The DBMS, when using PKI-based authentication, must enforce authorized access to the corresponding private key.

    &lt;VulnDiscussion&gt;The cornerstone of the PKI is the private key used to encrypt or digitally sign information. If the private key is stolen, t...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules