II - Mission Support Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000266-DB-000162
<GroupDescription></GroupDescription>Group -
The DBMS must only generate error messages that provide information necessary for corrective actions without revealing organization-defined sensitive or potentially harmful information in error logs and administrative messages that could be exploited.
<VulnDiscussion>Any application providing too much information in error logs and in administrative messages to the screen risks compromising ...Rule Medium Severity -
SRG-APP-000267-DB-000163
<GroupDescription></GroupDescription>Group -
The DBMS must restrict error messages so only authorized personnel may view them.
<VulnDiscussion>If the application provides too much information in error logs and administrative messages to the screen, this could lead to ...Rule Medium Severity -
SRG-APP-000178-DB-000083
<GroupDescription></GroupDescription>Group -
Applications must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
<VulnDiscussion>To prevent the compromise of authentication information, such as passwords, during the authentication process, the feedback f...Rule High Severity -
SRG-APP-000178-DB-000083
<GroupDescription></GroupDescription>Group -
When using command-line tools such as Oracle SQL*Plus, which can accept a plain-text password, users must use an alternative logon method that does not expose the password.
<VulnDiscussion>The SRG states: "To prevent the compromise of authentication information, such as passwords, during the authentication proce...Rule High Severity -
SRG-APP-000109-DB-000049
<GroupDescription></GroupDescription>Group -
The DBMS must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
<VulnDiscussion>In order to ensure sufficient storage capacity for the audit logs, the DBMS must be able to allocate audit record storage cap...Rule Medium Severity -
SRG-APP-000133-DB-000179
<GroupDescription></GroupDescription>Group -
Database software, applications, and configuration files must be monitored to discover unauthorized changes.
<VulnDiscussion>Any changes to the hardware, software, and/or firmware components of the information system and/or application can potentiall...Rule Medium Severity -
SRG-APP-000133-DB-000179
<GroupDescription></GroupDescription>Group -
Logic modules within the database (to include packages, procedures, functions and triggers) must be monitored to discover unauthorized changes.
<VulnDiscussion>Any changes to the hardware, software, and/or firmware components of the information system and/or application can potentiall...Rule Medium Severity -
SRG-APP-000133-DB-000198
<GroupDescription></GroupDescription>Group -
The DBMS software installation account must be restricted to authorized users.
<VulnDiscussion>When dealing with change control issues, it should be noted, any changes to the hardware, software, and/or firmware component...Rule High Severity -
SRG-APP-000133-DB-000199
<GroupDescription></GroupDescription>Group -
Database software directories, including DBMS configuration files, must be stored in dedicated directories, or DASD pools, separate from the host OS and other applications.
<VulnDiscussion>When dealing with change control issues, it should be noted, any changes to the hardware, software, and/or firmware component...Rule Medium Severity -
SRG-APP-000148-DB-000103
<GroupDescription></GroupDescription>Group -
The DBMS must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
<VulnDiscussion>To assure accountability and prevent unauthorized access, organizational users shall be identified and authenticated. Organi...Rule Medium Severity -
SRG-APP-000180-DB-000115
<GroupDescription></GroupDescription>Group -
The DBMS must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
<VulnDiscussion>Non-organizational users include all information system users other than organizational users which include organizational em...Rule Medium Severity -
SRG-APP-000211-DB-000122
<GroupDescription></GroupDescription>Group -
The DBMS must separate user functionality (including user interface services) from database management functionality.
<VulnDiscussion>Information system management functionality includes functions necessary to administer databases, network components, worksta...Rule Medium Severity -
SRG-APP-000080-DB-000063
<GroupDescription></GroupDescription>Group -
The DBMS must protect against an individual who uses a shared account falsely denying having performed a particular action.
<VulnDiscussion>Non-repudiation of actions taken is required in order to maintain application integrity. Examples of particular actions taken...Rule Low Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
DBA OS accounts must be granted only those host system privileges necessary for the administration of the DBMS.
<VulnDiscussion>This requirement is intended to limit exposure due to operating from within a privileged account or role. The inclusion of ro...Rule High Severity -
SRG-APP-000456-DB-000390
<GroupDescription></GroupDescription>Group -
Oracle software must be evaluated and patched against newly found vulnerabilities.
<VulnDiscussion>Security faults with software applications and operating systems are discovered daily. Vendors are constantly updating and pa...Rule High Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
DBMS default accounts must be assigned custom passwords.
<VulnDiscussion>Password maximum lifetime is the maximum period of time, (typically in days) a user's password may be in effect before the u...Rule High Severity -
SRG-APP-000441-DB-000378
<GroupDescription></GroupDescription>Group -
The DBMS must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission unless the transmitted data is otherwise protected by alternative physical measures.
<VulnDiscussion>Preventing the disclosure of transmitted information requires that applications take measures to employ some form of cryptogr...Rule High Severity -
SRG-APP-000142-DB-000094
<GroupDescription></GroupDescription>Group -
The DBMS must support the disabling of network protocols deemed by the organization to be nonsecure.
<VulnDiscussion>This requirement is related to remote access, but more specifically to the networking protocols allowing systems to communica...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The DBMS must provide a mechanism to automatically identify accounts designated as temporary or emergency accounts.
<VulnDiscussion>Temporary application accounts could be used in the event of a vendor support visit where a support representative requires a...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The DBMS must provide a mechanism to automatically remove or disable temporary user accounts after 72 hours.
<VulnDiscussion>Temporary application accounts could ostensibly be used in the event of a vendor support visit where a support representative...Rule Medium Severity -
SRG-APP-000328-DB-000301
<GroupDescription></GroupDescription>Group -
The DBMS must enforce Discretionary Access Control (DAC) policy allowing users to specify and control sharing by named individuals, groups of individuals, or by both, limiting propagation of access rights and including or excluding access to the granularity of a single user.
<VulnDiscussion>Access control policies (e.g., identity-based policies, role-based policies, attribute-based policies) and access enforcement...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
A single database connection configuration file must not be used to configure all database clients.
<VulnDiscussion>Applications employ the concept of least privilege for specific duties and information systems (including specific functions,...Rule Medium Severity -
SRG-APP-000133-DB-000362
<GroupDescription></GroupDescription>Group -
The DBMS must be protected from unauthorized access by developers.
<VulnDiscussion>Applications employ the concept of least privilege for specific duties and information systems (including specific functions,...Rule Medium Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
The DBMS must be protected from unauthorized access by developers on shared production/development host systems.
<VulnDiscussion>Applications employ the concept of least privilege for specific duties and information systems (including specific functions,...Rule Medium Severity -
SRG-APP-000243-DB-000374
<GroupDescription></GroupDescription>Group -
The DBMS must restrict access to system tables and other configuration information or metadata to DBAs or other authorized users.
<VulnDiscussion>Applications employ the concept of least privilege for specific duties and information systems (including specific functions,...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.