O112-BP-024100 - DBMS production application and data directories must be protected from developers on shared production/development DBMS host systems.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Developer roles should not be assigned DBMS administrative privileges to production DBMS application and data directories. The separation of production DBA and developer roles helps protect the production system from unauthorized, malicious or unintentional interruption due to development activities.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Create separate DBMS host OS groups for developer and production DBAs.

Do not assign production DBA OS group membership to accounts used for development.

Remove development accounts from production DBA OS group membership.

Recommend establishing a dedicated DBMS host for production DBMS installations (See Checks O112-BP-025000 and O112-BP-025300). A dedicated host system in this case refers to an instance of the operating system at a minimum. The operating system may reside on a virtual host machine where supported by the DBMS vendor.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Database_11-2g_V2R4_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-219724r879887_rule, STIG-ID|O112-BP-024100, STIG-Legacy|SV-68259, STIG-Legacy|V-54019, Vuln-ID|V-219724

Plugin: OracleDB

Control ID: cecb429782a958d47fde61cb8cf02acc5e12ce137f37226bf5c22092370c3705