UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Transaction logs should be periodically reviewed for unauthorized modification of data.


Overview

Finding ID Version Rule ID IA Controls Severity
V-15133 DG0031-ORACLE11 SV-28970r1_rule ECCD-1 ECCD-2 Medium
Description
Unauthorized or malicious changes to data compromise the integrity and usefulness of the data. Auditing changes to data supports accountability and non-repudiation. Auditing changes to data may be provided by the application accessing the DBMS or may depend upon the DBMS auditing functions. When DBMS auditing is used, the DBA is responsible for ensuring the auditing configuration meets the application design requirements.
STIG Date
Oracle Database 11g Instance STIG 2015-03-26

Details

Check Text ( C-29549r1_chk )
If the application does not require auditing using DBMS features, this check is Not Applicable.

Review the application System Security Plan for requirements for database configuration for auditing changes to application data.

If the application requires DBMS auditing for changes to data, review the database audit configuration against the application requirement. If the auditing does not comply with the requirement, this is a Finding.
Fix Text (F-26651r1_fix)
Configure database data auditing to comply with the requirements of the application.

Document auditing requirements in the System Security Plan.