DO3440-ORACLE11 - The DBA role should not be granted to unauthorized user accounts - 'No unauthorized DBA accounts exist'

Information

The DBA role is very powerful and access to it should be restricted. Verify that any database account granted the DBA role is explicitly authorized by the IAO. In addition to full access to database objects, access to the DBA role by unauthorized accounts may provide full access to the server. Verify that individual DBA accounts are created for each DBA and that the DBA accounts are used only for DBA functions.

Solution

Authorize and document all DBA role authorizations in the System Security Plan.

Revoke DBA role membership from unauthorized accounts.

Revoke DBA role membership from any accounts assigned to a developer job function on a shared production / development database.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Database_11g_Y21M10_STIG.zip

Item Details

References: CAT|II, Rule-ID|SV-24549r2_rule, STIG-ID|DO3440-ORACLE11, Vuln-ID|V-2527

Plugin: OracleDB

Control ID: 5959f78046329bc2e823e7deea0f8ba3616c7a341ad65aca4a86834a7a1100cf