UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Connections by mid-tier web and application systems to the Oracle DBMS from a DMZ or external network must be encrypted.


Overview

Finding ID Version Rule ID IA Controls Severity
V-53997 O112-BP-023000 SV-68237r3_rule Medium
Description
Multi-tier systems may be configured with the database and connecting middle-tier system located on an internal network, with the database located on an internal network behind a firewall and the middle-tier system located in a DMZ. In cases where either or both systems are located in the DMZ (or on networks external to DoD), network communications between the systems must be encrypted.
STIG Date
Oracle Database 11.2g Security Technical Implementation Guide 2017-04-05

Details

Check Text ( C-54787r4_chk )
Review the System Security Plan for remote applications that access and use the database.

For each remote application or application server, determine whether communications between it and the DBMS are encrypted. If any are not encrypted, this is a finding.
Fix Text (F-58835r6_fix)
Configure communications between the DBMS and remote applications/application servers to use DoD-approved encryption.