O112-C2-011600 - Unused database components, DBMS software, and database objects must be removed.

Information

Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, provided by default, may not be necessary to support essential organizational operations (e.g., key missions, functions).

It is detrimental for applications to provide, or install by default, functionality exceeding requirements or mission objectives. Examples include, but are not limited to, installing advertising software, demonstrations, or browser plug-ins not related to requirements or providing a wide array of functionality not required for the mission.

Applications must adhere to the principles of least functionality by providing only essential capabilities.

Demonstration and sample database objects and applications present publicly known attack points for malicious users. These demonstration and sample objects are meant to provide simple examples of coding specific functions and are not developed to prevent vulnerabilities from being introduced to the DBMS and host system.

Unused and unnecessary DBMS components increase the attack vector for the DBMS by introducing additional targets for attack. By minimizing the services and applications installed on the system, the number of potential vulnerabilities is reduced.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

If any components are required for operation of applications that will be accessing the DBMS, include them in the system documentation.

You cannot remove components, either via Database Configuration Assistant (DBCA) or manually once the database has been created.

You can, however, use DBCA to create a database and remove components during the creation process, before you create the database.

When using DBCA to create a custom database, select Database Template = Custom/Database Components.
Components that can be selected or de-selected are:

Oracle Text,
Oracle OLAP,
Oracle Spatial,
Oracle Label Security,
Sample Schemas,
Enterprise Manager Repository,
Oracle Warehouse Builder,
Oracle Database Vault

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Database_11-2g_V2R5_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7a., CAT|II, CCI|CCI-000381, Rule-ID|SV-219769r960963_rule, STIG-ID|O112-C2-011600, STIG-Legacy|SV-66449, STIG-Legacy|V-52233, Vuln-ID|V-219769

Plugin: OracleDB

Control ID: 4849b4ee8ffe5cbcb50ff5c5164ca733c56f98af23e917bbe813f6034045f190