Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Replication accounts must not be granted DBA privileges.

    &lt;VulnDiscussion&gt;Replication accounts may be used to access databases defined for the replication architecture. An exploit of a replication on...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Network access to the DBMS must be restricted to authorized personnel.

    &lt;VulnDiscussion&gt;Restricting remote access to specific, trusted systems helps prevent access by unauthorized and potentially malicious users.&...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Changes to configuration options must be audited.

    &lt;VulnDiscussion&gt;When standard auditing is in use, the AUDIT_SYS_OPERATIONS parameter is used to enable auditing of actions taken by the user ...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Changes to DBMS security labels must be audited.

    &lt;VulnDiscussion&gt;Some DBMS systems provide the feature to assign security labels to data elements. If labeling is required, implementation opt...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Remote database or other external access must use fully-qualified names.

    &lt;VulnDiscussion&gt;The Oracle GLOBAL_NAMES parameter is used to set the requirement for database link names to be the same name as the remote da...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • The /diag subdirectory under the directory assigned to the DIAGNOSTIC_DEST parameter must be protected from unauthorized access.

    &lt;VulnDiscussion&gt;&lt;DIAGNOSTIC_DEST&gt;/diag indicates the directory where trace, alert, core and incident directories and files are located....
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Remote administration must be disabled for the Oracle connection manager.

    &lt;VulnDiscussion&gt;Remote administration provides a potential opportunity for malicious users to make unauthorized changes to the Connection Man...
    Rule Medium Severity
  • SRG-APP-000516-DB-000363

    <GroupDescription></GroupDescription>
    Group
  • Network client connections must be restricted to supported versions.

    &lt;VulnDiscussion&gt;Unsupported Oracle network client installations may introduce vulnerabilities to the database. Restriction to use of supporte...
    Rule Medium Severity
  • SRG-APP-000176-DB-000068

    <GroupDescription></GroupDescription>
    Group
  • The DBMS, when using PKI-based authentication, must enforce authorized access to the corresponding private key.

    &lt;VulnDiscussion&gt;The cornerstone of the PKI is the private key used to encrypt or digitally sign information. If the private key is stolen, t...
    Rule High Severity
  • SRG-APP-000001-DB-000031

    <GroupDescription></GroupDescription>
    Group
  • The DBMS must limit the number of concurrent sessions for each system account to an organization-defined number of sessions.

    &lt;VulnDiscussion&gt;Application management includes the ability to control the number of users and user sessions utilizing an application. Limiti...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules