UCF STIG Viewer Logo

Audit records should be restricted to authorized individuals.


Overview

Finding ID Version Rule ID IA Controls Severity
V-5686 DG0032-ORACLE11 SV-24622r1_rule ECTP-1 Medium
Description
Audit data is frequently targeted by malicious users as it can provide a means to detect their activity. The protection of the audit trail data is of special concern and requires restrictions to allow only the auditor and DBMS backup, recovery, and maintenance users access to it.
STIG Date
Oracle 11 Database Instance STIG 2014-01-14

Details

Check Text ( None )
None
Fix Text (F-2559r1_fix)
Document and authorize accounts granted access to the AUD$ table in the System Security Plan.

Revoke access permissions granted to the AUD$ table from unauthorized users.