UCF STIG Viewer Logo

Remote administrative access to the database should be monitored by the IAO or IAM.


Overview

Finding ID Version Rule ID IA Controls Severity
V-15118 DG0159-ORACLE10 SV-24809r1_rule EBRP-1 Medium
Description
Remote administrative access to systems provides a path for access to and exploit of DBA privileges. Where the risk has been accepted to allow remote administrative access, it is imperative to implement increased monitoring of this access to detect any abuse or compromise.
STIG Date
Oracle 10 Database Installation STIG 2014-01-14

Details

Check Text ( C-29376r1_chk )
If remote administrative access to the database is prohibited and is disabled (See Check DG0093), this check is Not a Finding.

Review policy, procedure and evidence of implementation for monitoring of remote administrative access to the database.

If monitoring procedures for remote administrative access are not documented or implemented, this is a Finding.
Fix Text (F-26401r1_fix)
Develop, document and implement policy and procedures to monitor remote administrative access to the DBMS.

The automated generation of a log report with automatic dissemination to the IAO/IAM may be used.

Require and store an acknowledgement of receipt and confirmation of review for the log report.