UCF STIG Viewer Logo

Oracle WebLogic must protect the integrity of applications during the processes of data aggregation, packaging, and transformation in preparation for deployment.


Overview

Finding ID Version Rule ID IA Controls Severity
V-56333 WBLC-08-000235 SV-70587r1_rule Low
Description
Information can be subjected to unauthorized changes (e.g., malicious and/or unintentional modification) at information aggregation or protocol transformation points. It is therefore imperative the application take steps to validate and assure the integrity of data while at these stages of processing. The application server must ensure the integrity of data that is pending transfer for deployment is maintained. If the application were to simply transmit aggregated, packaged, or transformed data without ensuring the data was not manipulated during these processes, then the integrity of the data and the application itself may be called into question.
STIG Date
Oracle WebLogic Server 12c Security Technical Implementation Guide 2016-02-03

Details

Check Text ( C-56887r3_chk )
1. Access AC
2. From 'Domain Structure', select the top-level domain
3. Select 'Configuration' tab -> 'General' tab
4. Ensure 'Production Mode' checkbox is selected

If the 'Production Mode' checkbox is not selected, this is a finding.
Fix Text (F-61215r4_fix)
1. Access AC
2. From 'Domain Structure', select the top-level domain
3. Select 'Configuration' tab -> 'General' tab
4. Check 'Production Mode' checkbox. Click 'Save'
5. Restart all servers