DG0052-ORACLE11 – All applications that access the database should be logged in the audit trail. Details Protections and privileges are designed within the database to correspond to access via authorized software. Use of unauthorized software...
DG0053-ORACLE11 – A single database connection configuration file should not be used to configure all database clients. Details Many sites distribute a single client database connection configuration file to all site database users that contains network access...
DG0054-ORACLE11 – The audit logs should be periodically monitored to discover DBMS access using unauthorized applications. Details Regular and timely reviews of audit records increases the likelihood of early discovery of suspicious activity. Discovery of suspicious...
DG0063-ORACLE11 – DBMS privileges to restore database data or other DBMS configurations, features, or objects should be restricted to authorized DBMS accounts. Details Unauthorized restoration of database data, objects, or other configuration or features can result in a loss of data integrity,...
DG0068-ORACLE11 – DBMS tools or applications that echo or require a password entry in clear text should be protected from password display. Details Database applications may allow for entry of the account name and password as a visible parameter of the application...
DG0069-ORACLE11 – Procedures and restrictions for import of production data to development databases should be documented, implemented and followed. Details Data export from production databases may include sensitive data. Application developers may not be cleared for or have need-to-know...
DG0083-ORACLE11 – Automated notification of suspicious activity detected in the audit trail should be implemented. Details Audit record collection may quickly overwhelm storage resources and an auditor’s ability to review it in a productive manner....
DG0086-ORACLE11 – DBA roles should be periodically monitored to detect assignment of unauthorized or excess privileges. Details Excess privilege assignment can lead to intentional or unintentional unauthorized actions. Such actions may compromise the operation or integrity...
DG0088-ORACLE11 – The DBMS should be periodically tested for vulnerability management and IA compliance. Details The DBMS security configuration may be altered either intentionally or unintentionally over time. The DBMS may also be the...
DG0090-ORACLE11 – Sensitive information stored in the database should be protected by encryption. Details Sensitive data stored in unencrypted format within the database is vulnerable to unauthorized viewing. NOTE: Nessus has not performed...