UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Only necessary privileges to the host system should be granted to DBA OS accounts.


Overview

Finding ID Version Rule ID IA Controls Severity
V-6756 DG0005-ORACLE11 SV-24346r1_rule ECLP-1 Medium
Description
Database administration accounts are frequently granted more permissions to the local host system than are necessary. This allows inadvertent or malicious changes to the host operating system.
STIG Date
Oracle Database 11g Installation STIG 2014-12-16

Details

Check Text ( C-28571r1_chk )
Review host system privileges assigned to the Oracle DBA group and all individual Oracle DBA accounts.

NOTE: do not include the Oracle software installation account in any results for this check.

For UNIX systems (as root):
cat /etc/group | grep -i dba
groups root

If "root" is returned in the first list, this is a Finding.

If any accounts listed in the first list are also listed in the second list, this is a Finding.

Investigate any user account group memberships other than DBA or root groups that are returned by the following command (also as root):

groups [dba user account]

Replace [dba user account] with the user account name of each DBA account.

If individual DBA accounts are assigned to groups that grant access or privileges for purposes other than DBA responsibilities, this is a Finding.

For Windows Systems (click or select):
Start / Settings / Control Panel / Administrative Tools / Computer Management / Local Users and Groups / Groups / ORA_DBA
Start / Settings / Control Panel / Administrative Tools / Computer Management / Local Users and Groups / Groups / ORA_[SID]_DBA (if present)

NOTE: Users assigned DBA privileges on a Windows host are granted membership in the ORA_DBA and/or ORA_[SID]_DBA groups. The ORA_DBA group grants DBA privileges to any database on the system. The ORA_[SID]_DBA groups grant DBA privileges to specific Oracle instances only.

Make a note of each user listed. For each user (click or select):
Start / Settings / Control Panel / Administrative Tools / Computer Management / Local Users and Groups / Users / [DBA user name] / Member of

If DBA users belong to any groups other than DBA groups and the Windows Users group, this is a Finding.

Examine User Rights assigned to DBA groups or group members:
Start / Settings / Control Panel / Administrative Tools / Local Security Policy / Security Settings / Local Policies / User Rights Assignments

If any User Rights are assigned directly to the DBA group(s) or DBA user accounts, this is a Finding.
Fix Text (F-24656r1_fix)
Revoke all host system privileges from the DBA group accounts and DBA user accounts not required for DBMS administration.

Revoke all OS group memberships that assign excessive privileges to the DBA group accounts and DBA user accounts.

Remove any directly applied permissions or user rights from the DBA group accounts and DBA user accounts.

You should document all DBA group accounts and individual DBA account assigned privileges in the System Security Plan.