DG0050-ORACLE11 - Database software, applications and configuration files should be monitored to discover unauthorized changes.

Information

Unmanaged changes that occur to the database software libraries or configuration can lead to unauthorized or compromised installations.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Develop, document and implement procedures to monitor for unauthorized changes to DBMS software libraries, related software application libraries and configuration files.

If a third-party automated tool is not employed, an automated job that reports file information on the directories and files of interest and compares them to the baseline report for the same will meet the requirement.

File hashes or checksums should be used for comparisons as file dates may be manipulated by malicious users.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Database_11g_Y21M10_STIG.zip

Item Details

References: CAT|II, Rule-ID|SV-24383r1_rule, STIG-ID|DG0050-ORACLE11, Vuln-ID|V-2423

Plugin: Unix

Control ID: 59db2a1ba490de9b22ab27df47af66489949ba1d052fdffe6a3052802f766fb9