UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Audit records should be restricted to authorized individuals.


Overview

Finding ID Version Rule ID IA Controls Severity
V-5686 DG0032-ORACLE10 SV-24621r2_rule ECTP-1 Medium
Description
Audit data is frequently targeted by malicious users as it can provide a means to detect their activity. The protection of the audit trail data is of special concern and requires restrictions to allow only the auditor and DBMS backup, recovery, and maintenance users access to it.
STIG Date
Oracle Database 10g Instance STIG 2014-04-02

Details

Check Text ( C-26276r2_chk )
From SQL*Plus: select value from v$parameter where name = 'audit_trail'; If none of the following values is displayed, this check is Not a Finding. Oracle 10.1 – 10.2 = 'db' Oracle 10.1 = 'db_extended' Oracle 10.2 = 'db, extended' Review access granted to the AUD$ table. From SQL*Plus: select grantee from dba_tab_privs where table_name = 'AUD$' and grantee not in ('DELETE_CATALOG_ROLE') and grantee not in (select grantee from dba_role_privs where granted_role = 'DBA') order by grantee; View access granted to the AUD$ table against those authorized in the System Security Plan. If any are not authorized, this is a Finding.
Fix Text (F-2551r1_fix)
Document and authorize accounts granted access to the AUD$ table in the System Security Plan. Revoke access permissions granted to the AUD$ table from unauthorized users.