1. Home
  2. Security Hardening
  3. CIS V1.1.0 Oracle 11G OS L2
  4. All associated application files – ‘Verify permissions’

All associated application files – ‘Verify permissions’

Details

Allowing improper access to binaries that directly interface with the Oracle database adds unnecessary risk and increases the attack surface

Supportive Information

The following resource is also helpful.

This control applies to the following type of system Unix.

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles