UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The ISSM must review changes to DBA role assignments.


Overview

Finding ID Version Rule ID IA Controls Severity
V-61497 O121-BP-024600 SV-75987r1_rule Medium
Description
Unauthorized assignment of DBA privileges can lead to a compromise of DBMS integrity. Providing oversight to the authorization and assignment of privileges provides the separation of duty to support sufficient oversight.
STIG Date
Oracle Database 12c Security Technical Implementation Guide 2018-01-03

Details

Check Text ( C-62369r1_chk )
Review policy and procedures documented or noted in the System Security Plan as well as evidence of implementation for monitoring changes to DBA role assignments and procedures for notifying the ISSM of the changes for review.

If policy, procedures or implementation evidence do not exist, this is a finding.
Fix Text (F-67413r1_fix)
Develop, document and implement procedures to monitor changes to DBA role assignments.

Develop, document and implement procedures to notify the ISSM of changes to DBA role assignments.

Include in the procedures methods that provide evidence of monitoring and notification.