1.14 All associated application files - 'Verify permissions'

Information

Allowing improper access to binaries that directly interface with the Oracle database adds unnecessary risk and increases the attack surface
of the database.
Level 2, Not Scorable
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.as it requires manual verification that all application files have proper ownership and minimal file
permissions.

See Also

https://workbench.cisecurity.org/files/580