O121-BP-023100 - Database job/batch queues must be reviewed regularly to detect unauthorized database job submissions.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Unauthorized users may bypass security mechanisms by submitting jobs to job queues managed by the database to be run under a more privileged security context of the database or host system. These queues must be monitored regularly to detect any such unauthorized job submissions.

Solution

Develop, document and implement procedures to monitor the database job queues for unauthorized job submissions.

Develop, document and implement a formal migration plan to convert jobs using DBMS_JOB to use DBMS_SCHEDULER instead for Oracle versions 10.1 and higher. (This does not apply to DBMS_JOB jobs generated by Oracle itself, such as those for refreshing materialized views.)

Set the value of the job_queue_processes parameter to a low value to restrict concurrent DBMS_JOB executions.

Use auditing to capture use of the DBMS_JOB package in the audit trail. Review the audit trail for unauthorized use of the DBMS_JOB package.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Oracle_Database_12c_V3R1_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-219842r961863_rule, STIG-ID|O121-BP-023100, STIG-Legacy|SV-75939, STIG-Legacy|V-61449, Vuln-ID|V-219842

Plugin: OracleDB

Control ID: ce2396f3b17c03c952f533670468c04f32500e0c7aad903fbba457f76afcc9a5