III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000516-DB-000363
Group -
Access to default accounts used to support replication must be restricted to authorized DBAs.
Replication database accounts are used for database connections between databases. Replication requires the configuration of these accounts using the same username and password on all databases par...Rule Medium Severity -
SRG-APP-000516-DB-000363
Group -
Oracle instance names must not contain Oracle version numbers.
Service names may be discovered by unauthenticated users. If the service name includes version numbers or other database product information, a malicious user may use that information to develop a ...Rule Medium Severity -
SRG-APP-000516-DB-000363
Group -
Fixed user and public database links must be authorized for use.
Database links define connections that may be used by the local database to access remote Oracle databases. These links provide a means for a compromise to the local database to spread to remote da...Rule Medium Severity -
SRG-APP-000516-DB-000363
Group -
A minimum of two Oracle control files must be defined and configured to be stored on separate, archived disks (physical or virtual) or archived partitions on a RAID device.
Oracle control files are used to store information critical to Oracle database integrity. Oracle uses these files to maintain time synchronization of database files as well as at system startup to ...Rule Low Severity -
SRG-APP-000516-DB-000363
Group -
A minimum of two Oracle redo log groups/files must be defined and configured to be stored on separate, archived physical disks or archived directories on a RAID device.
The Oracle redo log files store the detailed information on changes made to the database. This information is critical to database recovery in case of a database failure.Rule Medium Severity -
SRG-APP-000516-DB-000363
Group -
The Oracle WITH GRANT OPTION privilege must not be granted to non-DBA or non-Application administrator user accounts.
An account permission to grant privileges within the database is an administrative function. Minimizing the number and privileges of administrative accounts reduces the chances of privileged accoun...Rule Medium Severity -
SRG-APP-000516-DB-000363
Group -
The Oracle REMOTE_OS_AUTHENT parameter must be set to FALSE.
Setting this value to TRUE allows operating system authentication over an unsecured connection. Trusting remote operating systems can allow a user to impersonate another operating system user and c...Rule High Severity -
SRG-APP-000516-DB-000363
Group -
The Oracle REMOTE_OS_ROLES parameter must be set to FALSE.
Setting REMOTE_OS_ROLES to TRUE allows operating system groups to control Oracle roles. The default value of FALSE causes roles to be identified and managed by the database. If REMOTE_OS_ROLES is s...Rule High Severity -
SRG-APP-000516-DB-000363
Group -
The Oracle SQL92_SECURITY parameter must be set to TRUE.
The configuration option SQL92_SECURITY specifies whether table-level SELECT privileges are required to execute an update or delete that references table column values. If this option is disabled (...Rule Medium Severity -
SRG-APP-000516-DB-000363
Group -
The Oracle password file ownership and permissions should be limited and the REMOTE_LOGIN_PASSWORDFILE parameter must be set to EXCLUSIVE or NONE.
It is critically important to the security of your system that you protect your password file and the environment variables that identify the location of the password file. Any user with access to ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.