DG0145-ORACLE11 - Audit records should contain required information.

Information

Complete forensically valuable data may be unavailable or accountability may be jeopardized when audit records do not contain sufficient information.

Solution

Configure audit settings to include the following list of elements in the audit logs at a minimum:
- User ID.
- Successful and unsuccessful attempts to access security files
- Date and time of the event.
- Type of event.
- Success or failure of event.
- Successful and unsuccessful logons.
- Denial of access resulting from excessive number of logon attempts.
- Blocking or blacklisting a user ID, terminal or access port, and the reason for the action.
- Activities that might modify, bypass, or negate safeguards controlled by the system.
- Data required to audit the possible use of covert channel mechanisms.
- Privileged activities and other system-level access.
- Starting and ending time for access to the system.
- Security relevant actions associated with periods processing or the changing of security labels or categories of information.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Database_11g_Y21M10_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-3, 800-53|AU-12c., CAT|II, Rule-ID|SV-30881r1_rule, STIG-ID|DG0145-ORACLE11, Vuln-ID|V-15646

Plugin: OracleDB

Control ID: 57ded35af50349b35501cef6dd19b46519e92599294351f96fc2b10780b5c8c8