UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Audit records should be restricted to authorized individuals.


Overview

Finding ID Version Rule ID IA Controls Severity
V-5686 DG0032-ORACLE10 SV-24621r1_rule ECTP-1 Medium
Description
Audit data is frequently targeted by malicious users as it can provide a means to detect their activity. The protection of the audit trail data is of special concern and requires restrictions to allow only the auditor and DBMS backup, recovery, and maintenance users access to it.
STIG Date
Oracle 10 Database Instance STIG 2014-01-14

Details

Check Text ( None )
None
Fix Text (F-2551r1_fix)
Document and authorize accounts granted access to the AUD$ table in the System Security Plan.

Revoke access permissions granted to the AUD$ table from unauthorized users.