DG0129-ORACLE11 - Passwords should be encrypted when transmitted across the network.

Information

DBMS passwords sent in clear text format across the network are vulnerable to discovery by unauthorized users. Disclosure of passwords may easily lead to unauthorized access to the database.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Utilize Oracle connection protocols and products (i.e. Oracle Client) where possible.

Where other connection products and protocols are used, ensure configuration options for encrypting passwords during login events across the network are used.

If the database does not provide encryption for login events natively, employ encryption at the OS or network level.

Ensure passwords remain encrypted from source to destination.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Database_11g_Y21M10_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1)(c), CAT|I, Rule-ID|SV-24967r1_rule, STIG-ID|DG0129-ORACLE11, Vuln-ID|V-15636

Plugin: Unix

Control ID: a699731435877e5378bc4031d1c8acb21c23fd017ac7f2d8cd371c420d5649c0