UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Connections by mid-tier web and application systems to the Oracle DBMS should be protected, encrypted and authenticated according to database, web, application, enclave and network requirements.


Overview

Finding ID Version Rule ID IA Controls Severity
V-3440 DO0360-ORACLE11 SV-24537r2_rule IAGA-1 Medium
Description
Multi-tier systems may be configured with the database and connecting middle-tier system located on an internal network, with the database located on an internal network behind a firewall and the middle-tier system located in a DMZ. In cases where systems are located in the DMZ, network communications between both systems must be encrypted. In all cases, the application account requires PKI authentication. IP address restriction to the backend database system, under a separate requirement, provides an additional level of protection.
STIG Date
Oracle Database 11g Installation STIG 2014-04-02

Details

Check Text ( C-29453r2_chk )
Review the System Security Plan for remote applications that access and use the database.

If none of the applications accessing the database uses a single account for access by multiple persons or processes, this check is Not a Finding.

Verify that the application account uses PKI authentication:

From SQL*Plus:

select name, ext_username from user$ where ext_username <> NULL;

If the ext_username indicates a directory name, then verify that the directory name is authenticated using PKI.

You may require the DBA or directory server administrator to display the username definition in the directory service to you.

If the ext_username does not specify a certificate or PKI-authenticated user account, this is a Finding.
Fix Text (F-26517r1_fix)
Configure PKI authentication to help protect access to the shared account.

PKI authentication may be accomplished using Oracle Advanced Security on most platforms.

On a Windows host, user authentication using PKI may be used with Active Directory or NTS authentication using the DoD CAC.

On UNIX and other hosts, Oracle Advanced Security may used to authenticate via LDAP or SSL.

The application may require storage of the authentication certificate in the Oracle Wallet or on a hardware security module (HSM) to authenticate.

Please see the Oracle Security Guides and the Oracle Advanced Security Guides for instructions on configuring PKI authentication.