5.1 Enable 'USER' Audit Option

Information

Any unauthorized attempts to create, drop or alter a user should cause concern, whether successful or not. It can also be useful in forensics if an account is compromised and is mandated by many common security initiatives. An abnormally high number of these activities in a given period might be worth investigation. Any failed attempt to drop a user or create a user may be worth further review.

Solution

Execute the following SQL statement to remediate this setting. AUDIT USER; Impact: This would the current 5.2 (audit CREATE USER), 5.3 (audit ALTER USER), and 5.4 (audit DROP USER) privilege audits with the single statement auditing option 'audit USER'. Any action audited by those three privilege audits would also be audited by this. In addition, this would audit: 1) Attempts to create user by anyone without the CREATE USER system privilege 2) Attempts to drop user by anyone without the DROP USER system privilege 3) Attempts to alter user by anyone without the ALTER USER system privilege 4) Users changing or attempting to change their own passwords (which is not done by auditing ALTER USER).

See Also

https://workbench.cisecurity.org/files/601

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12c.

Plugin: OracleDB

Control ID: d3f076be40abd59eda14be51af4bfd34a62c3f7d4f16d95ca44c016c3d8ee4c0