UCF STIG Viewer Logo

Remote administrative access to the database must be monitored by the ISSO or ISSM.


Overview

Finding ID Version Rule ID IA Controls Severity
V-61493 O121-BP-024400 SV-75983r1_rule Medium
Description
Remote administrative access to systems provides a path for access to and exploit of DBA privileges. Where the risk has been accepted to allow remote administrative access, it is imperative to instate increased monitoring of this access to detect any abuse or compromise.
STIG Date
Oracle Database 12c Security Technical Implementation Guide 2017-04-05

Details

Check Text ( C-62365r1_chk )
If remote administrative access to the database is prohibited and is disabled, this check is not a finding.

Review policy, procedure and evidence of implementation for monitoring of remote administrative access to the database.

If monitoring procedures for remote administrative access are not documented or implemented, this is a finding.
Fix Text (F-67409r1_fix)
Develop, document and implement policy and procedures to monitor remote administrative access to the DBMS.

The automated generation of a log report with automatic dissemination to the ISSO/ISSM may be used.

Require and store an acknowledgement of receipt and confirmation of review for the log report.