UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Audit records must include the reason for blacklisting or disabling DBMS connections or accounts, to the extent that such information is available.


Overview

Finding ID Version Rule ID IA Controls Severity
V-54053 O112-BP-025900 SV-68293r2_rule Medium
Description
Records of any disabling or locking of account actions taken by the DBMS can contain information valuable to decisions to employ additional responsive actions.
STIG Date
Oracle Database 11.2g Security Technical Implementation Guide 2016-12-15

Details

Check Text ( C-54847r2_chk )
Review audit settings for disabling or locking account events based on event failures.

If the settings are not configured to include available information about the cause of locking or disabling accounts, this is a finding.
Fix Text (F-58895r2_fix)
Determine and implement audit settings that will collect and store available information about the cause of any DBMS account or connection lock or disabling actions taken by the DBMS.