Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • System Privileges must not be granted to PUBLIC.

    &lt;VulnDiscussion&gt;System privileges can be granted to users and roles and to the user group PUBLIC. All privileges granted to PUBLIC are access...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Oracle roles granted using the WITH ADMIN OPTION must not be granted to unauthorized accounts.

    &lt;VulnDiscussion&gt;The WITH ADMIN OPTION allows the grantee to grant a role to another database account. Best security practice restricts the pr...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Object permissions granted to PUBLIC must be restricted.

    &lt;VulnDiscussion&gt;Permissions on objects may be granted to the user group PUBLIC. Because every database user is a member of the PUBLIC group, ...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • The Oracle Listener must be configured to require administration authentication.

    &lt;VulnDiscussion&gt;Oracle listener authentication helps prevent unauthorized administration of the Oracle listener. Unauthorized administration ...
    Rule High Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Application role permissions must not be assigned to the Oracle PUBLIC role.

    &lt;VulnDiscussion&gt;Permissions granted to PUBLIC are granted to all users of the database. Custom roles must be used to assign application permi...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Oracle application administration roles must be disabled if not required and authorized.

    &lt;VulnDiscussion&gt;Application administration roles, which are assigned system or elevated application object privileges, must be protected from...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Connections by mid-tier web and application systems to the Oracle DBMS from a DMZ or external network must be encrypted.

    &lt;VulnDiscussion&gt;Multi-tier systems may be configured with the database and connecting middle-tier system located on an internal network, with...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Database job/batch queues must be reviewed regularly to detect unauthorized database job submissions.

    &lt;VulnDiscussion&gt;Unauthorized users may bypass security mechanisms by submitting jobs to job queues managed by the database to be run under a ...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Unauthorized database links must not be defined and active.

    &lt;VulnDiscussion&gt;DBMS links provide a communication and data transfer path definition between two databases that may be used by malicious user...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Sensitive information from production database exports must be modified before import to a development database.

    &lt;VulnDiscussion&gt;Data export from production databases may include sensitive data. Application developers do not have a need to know to sensit...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules