III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000133-DB-000179
<GroupDescription></GroupDescription>Group -
Database software, applications, and configuration files must be monitored to discover unauthorized changes.
<VulnDiscussion>Any changes to the hardware, software, and/or firmware components of the information system and/or application can potentiall...Rule Medium Severity -
SRG-APP-000133-DB-000179
<GroupDescription></GroupDescription>Group -
Logic modules within the database (to include packages, procedures, functions and triggers) must be monitored to discover unauthorized changes.
<VulnDiscussion>Any changes to the hardware, software, and/or firmware components of the information system and/or application can potentiall...Rule Medium Severity -
SRG-APP-000133-DB-000198
<GroupDescription></GroupDescription>Group -
The DBMS software installation account must be restricted to authorized users.
<VulnDiscussion>When dealing with change control issues, it should be noted, any changes to the hardware, software, and/or firmware component...Rule High Severity -
SRG-APP-000133-DB-000199
<GroupDescription></GroupDescription>Group -
Database software directories, including DBMS configuration files, must be stored in dedicated directories, or DASD pools, separate from the host OS and other applications.
<VulnDiscussion>When dealing with change control issues, it should be noted, any changes to the hardware, software, and/or firmware component...Rule Medium Severity -
SRG-APP-000148-DB-000103
<GroupDescription></GroupDescription>Group -
The DBMS must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
<VulnDiscussion>To assure accountability and prevent unauthorized access, organizational users shall be identified and authenticated. Organi...Rule Medium Severity -
SRG-APP-000180-DB-000115
<GroupDescription></GroupDescription>Group -
The DBMS must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
<VulnDiscussion>Non-organizational users include all information system users other than organizational users which include organizational em...Rule Medium Severity -
SRG-APP-000211-DB-000122
<GroupDescription></GroupDescription>Group -
The DBMS must separate user functionality (including user interface services) from database management functionality.
<VulnDiscussion>Information system management functionality includes functions necessary to administer databases, network components, worksta...Rule Medium Severity -
SRG-APP-000080-DB-000063
<GroupDescription></GroupDescription>Group -
The DBMS must protect against an individual who uses a shared account falsely denying having performed a particular action.
<VulnDiscussion>Non-repudiation of actions taken is required in order to maintain application integrity. Examples of particular actions taken...Rule Low Severity -
SRG-APP-000516-DB-000363
<GroupDescription></GroupDescription>Group -
DBA OS accounts must be granted only those host system privileges necessary for the administration of the DBMS.
<VulnDiscussion>This requirement is intended to limit exposure due to operating from within a privileged account or role. The inclusion of ro...Rule High Severity -
SRG-APP-000456-DB-000390
<GroupDescription></GroupDescription>Group -
Oracle software must be evaluated and patched against newly found vulnerabilities.
<VulnDiscussion>Security faults with software applications and operating systems are discovered daily. Vendors are constantly updating and pa...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.