UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Administrative privileges should be assigned to database accounts via database roles.


Overview

Finding ID Version Rule ID IA Controls Severity
V-15627 DG0117-ORACLE11 SV-24422r2_rule ECPA-1 Medium
Description
Privileges granted outside the role of the administrative user job function are more likely to go unmanaged or without oversight for authorization. Maintenance of privileges using roles defined for discrete job functions offers improved oversight of administrative user privilege assignments and helps to protect against unauthorized privilege assignment.
STIG Date
Oracle Database 11g Instance STIG 2015-03-26

Details

Check Text ( C-962r2_chk )
From SQL*Plus (NOTE: The owner list below is a short list of all possible default Oracle accounts):

select grantee||': '||privilege
from dba_sys_privs
where grantee not in
('SYS', 'SYSTEM', 'SYSMAN', 'CTXSYS', 'MDSYS', 'WKSYS')
and grantee not in
(select distinct granted_role from dba_role_privs)
and privilege <> 'UNLIMITED TABLESPACE'
order by grantee;

NOTE: Disregard any default database component account privilege assignments that may be returned.

If administrative privileges have been assigned directly to an account, this is a Finding.
Fix Text (F-3786r1_fix)
Revoke assigned administrative privileges from database accounts and assign to accounts via roles.

Document roles and assignments in the System Security Plan.