DG0161-ORACLE11 - An automated tool that monitors audit data and immediately reports suspicious activity should be employed for the DBMS.

Information

Audit logs only capture information on suspicious events. Without an automated monitoring and alerting tool, malicious activity may go undetected and without response until compromise of the database or data is severe.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Develop or procure, document and implement an automated, continuous on-line monitoring and audit trail creation capability for the DBMS is deployed with the capability to immediately alert personnel of any unusual or inappropriate activity with potential IA implications, and with a user-configurable capability to automatically disable the system if serious IA violations are detected.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Database_11g_Y21M10_STIG.zip

Item Details

References: CAT|II, Rule-ID|SV-24815r1_rule, STIG-ID|DG0161-ORACLE11, Vuln-ID|V-15103

Plugin: Unix

Control ID: ab0ca1ac995618e8d99d2bc55c8c910312444a84ed9f6d57da5736ca9591a289