Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-15133 | DG0031-ORACLE11 | SV-28970r1_rule | ECCD-1 ECCD-2 | Medium |
Description |
---|
Unauthorized or malicious changes to data compromise the integrity and usefulness of the data. Auditing changes to data supports accountability and non-repudiation. Auditing changes to data may be provided by the application accessing the DBMS or may depend upon the DBMS auditing functions. When DBMS auditing is used, the DBA is responsible for ensuring the auditing configuration meets the application design requirements. |
STIG | Date |
---|---|
Oracle Database 11g Instance STIG | 2015-03-26 |
Check Text ( C-29549r1_chk ) |
---|
If the application does not require auditing using DBMS features, this check is Not Applicable. Review the application System Security Plan for requirements for database configuration for auditing changes to application data. If the application requires DBMS auditing for changes to data, review the database audit configuration against the application requirement. If the auditing does not comply with the requirement, this is a Finding. |
Fix Text (F-26651r1_fix) |
---|
Configure database data auditing to comply with the requirements of the application. Document auditing requirements in the System Security Plan. |