DG0063: DBMS privileges to restore database data or other configurations, features, or objects should be restricted to authorized accounts.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Unauthorized restoration of database data, objects, or other configuration or features can result in a loss of data integrity, unauthorized configuration, or other DBMS interruption or compromise. Therefore, the capability to restore must be controlled. Typically, only database administrators will have permission to restore a database.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Utilize DBMS roles that are authorized for database restore functions.

Restrict assignment of restore privileges.

Assign DBMS restoration roles only to authorized DBMS accounts.

Document assignments in the System Security Plan.

See Also

http://iasecontent.disa.mil/stigs/zip/U_Oracle_Database_11g_V8R20_STIG.zip

Item Details

References: CAT|II, Rule-ID|SV-24635r2_rule, STIG-ID|DG0063-ORACLE11, Vuln-ID|V-15107

Plugin: Unix

Control ID: 8d3b4f9c2da3c49d3abd094e14780dd3c932165ba902938a169ca09416d64dae